A revised taxonomy for intrusion-detection systems

Intrusion-detection systems aim at detecting attacks against computer systems and networks, or in general against information systems. Indeed, it is difficult to provide provably secure information systems and to maintain them in such a secure state during their lifetime and utilization. Sometimes,...

Full description

Saved in:
Bibliographic Details
Published inAnnales des télécommunications Vol. 55; no. 7-8; pp. 361 - 378
Main Authors DEBAR, H, DACIER, M, WESPI, A
Format Journal Article
LanguageEnglish
Published Heidelberg Springer 01.07.2000
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Intrusion-detection systems aim at detecting attacks against computer systems and networks, or in general against information systems. Indeed, it is difficult to provide provably secure information systems and to maintain them in such a secure state during their lifetime and utilization. Sometimes, legacy or operational constraints do not even allow the definition of a fully secure information system. Therefore, intrusion- detection systems have the task of monitoring the usage of such systems to detect apparition of insecure states. They detect attempts and active misuse, either by legitimate users of the information systems or by external parties, to abuse their privileges or exploit security vulnerabilities. In a previous paper [Computer networks 31, 805–822 (1999)], we introduced a taxonomy of intrusion- detection systems that highlights the various aspects of this area. This paper extends the taxonomy beyond real- time intrusion detection to include additional aspects of security monitoring, such as vulnerability assessment.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:0003-4347
1958-9395
DOI:10.1007/BF02994844