Intrusion detection techniques and approaches

  • Authors:
  • Theuns Verwoerd;Ray Hunt

  • Affiliations:
  • Department of Computer Science, University of Canterbury, Private Bag 4800, Christchurch, New Zealand;Department of Computer Science, University of Canterbury, Private Bag 4800, Christchurch, New Zealand

  • Venue:
  • Computer Communications
  • Year:
  • 2002

Quantified Score

Hi-index 0.25

Visualization

Abstract

Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion detection systems (IDS) offer techniques for modelling and recognising normal and abusive system behaviour. Such methodologies include statistical models, immune system approaches, protocol verification, file and taint checking, neural networks, whitelisting, expression matching, state transition analysis, dedicated languages, genetic algorithms and burglar alarms. This paper describes these techniques including an IDS architectural outline and an analysis of IDS probe techniques finishing with a summary of associated technologies.