Feature: Intrusion Detection Revisited

  • Authors:
  • E.Eugene Schultz

  • Affiliations:
  • -

  • Venue:
  • Network Security
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusion detection systems (IDSs) offer the potential advantages of reducing manpower needed in monitoring, increasing detection efficiency, providing data that would otherwise not be available, helping the Information Security community learn about new vulnerabilities, and providing legal evidence. This technology has improved over time, but it unfortunately is beset with many inherent limitations. Examples include commercial products with insufficient capability to detect many attacks, lack of empirical testing, inability to handle encrypted traffic, and susceptibility to attack. Intrusion detection technology is, however, at a crossroads; governments' efforts to protect critical infrastructures are resulting in increased funding in this area. Additionally, deploying this technology advantageously within an organization involves a steep learning curve - integrating this technology into operational environments requires many cultural changes. Despite the many associated limitations in this technology, therefore, organizations should immediately start deploying it and integrating it into the mainstream of their operational activity.