Intrusion Detection: A Survey

  • Authors:
  • F. Sabahi;A. Movaghar

  • Affiliations:
  • -;-

  • Venue:
  • ICSNC '08 Proceedings of the 2008 Third International Conference on Systems and Networks Communications
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The rapid proliferation of computer networks has changed the prospect of network security. An easy accessibility condition cause computer network’s vulnerable against several threats from hackers. Threats to networks are numerous and potentially devastating. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Many of the technologies proposed are complementary to each other, since for different kind of environments some approaches perform better than others. This paper presents a taxonomy of intrusion detection systems that is then used to survey and classify them. The taxonomy consists of the detection principle, and second of certain operational aspects of the intrusion detection system.