DocumentCode :
3309176
Title :
Is your computer being misused? A survey of current intrusion detection system technology
Author :
McAuliffe, Noelle ; Wolcott, Dawn ; Schaefer, Lorrayne ; Kelem, Nancy ; Hubbard, Brian ; Haley, Theresa
Author_Institution :
Trusted Inf. Syst. Inc., Glenwood, MD, USA
fYear :
1990
fDate :
3-7 Dec 1990
Firstpage :
260
Lastpage :
272
Abstract :
All computer systems are vulnerable to abuse and penetration by both legitimate users who abuse their authority and individuals who are not authorized to use the computer system. Many systems are under development to aid in the detection of these abuses. The capabilities of these `intrusion detection systems´ (IDS) are varied, ranging from tools that provide for the meaningful reduction of audit data to tools that provide in-depth analysis of user and system behavior. The authors have performed a survey of the state-of-the-art in intrusion detection systems. This paper presents a summary of this survey
Keywords :
DP management; security of data; audit data; intrusion detection systems; system behavior; Application software; Computer hacking; Computer networks; Contracts; Information systems; Intrusion detection; Medical diagnostic imaging; Operating systems; Power generation economics; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2105-2
Type :
conf
DOI :
10.1109/CSAC.1990.143785
Filename :
143785
Link To Document :
بازگشت