Skip to main content

Abstract

Intrusion Detection Systems (IDSs) play an important role in the defense strategy of site security officers. An IDS can act as a second line of defense to provide security analysts with the necessary insights into the nature of hostile activities. Therefore, a good understanding of IDSs helps administrators make informed decisions when it comes to choosing the right product for their systems. System programmers will appreciate a classification of the different IDS design and implementation approaches that highlight their practical use. One can never assess an intrusion detection system without knowing the performance measurements involved and the evaluations used to gauge these metrics. This chapter covers to a reasonable extent the above mentioned issues and draws some conclusions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 449.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 599.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Ryan, M. Lin, R. Mikkulainen: Intrusion Detection with Neural Networks, Advances in Neural Information Processing Systems, Vol. 10 (MIT Press, Cambridge MA 1998)

    Google Scholar 

  2. A. Ghosh, A. Schwartzbard, M. Shatz: Learning Program Behavior Profiles for Intrusion Detection, Proc. 1st USENIX Workshop on Intrusion Detection and Network Monitoring (Santa Clara 1999)

    Google Scholar 

  3. S.L. Scott: A Bayesian paradigm for designing intrusion detection systems, Comput. Stat. Data Anal. 45(1), 69–83 (2004)

    Article  MATH  Google Scholar 

  4. J.E. Dickerson, J. Juslin, O. Koukousoula, J.A. Dickerson: Fuzzy intrusion detection, Proc. IFSA World Congress and 20th NAFIPS International Conference (Vancouver 2001)

    Google Scholar 

  5. R. Sekar, Y. Guang, S. Verma, T. Shanbhag: A high-performance network intrusion detection system, Proc. 6th ACM Conference on Computer and Communication Security (Singapore 1999)

    Google Scholar 

  6. R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou: Specification-based anomaly detection: A new approach for detecting network intrusions, ACM Computer and Communication Security Conference (CCS) (Washington DC 2002)

    Google Scholar 

  7. K. Ilgun, R.A. Kemmerer, P.A. Porras: State Transition Analysis: A Rule-Based Intrusion Detection Approach, IEEE Trans. Soft. Eng. 21(3), 181–199 (1995)

    Article  Google Scholar 

  8. A. Pagnoni, A. Visconti: An innate immune system for the protection of computer networks, Proc. 4th Int. Symposium on Information and Communication Technologies (Cape Town 2005)

    Google Scholar 

  9. N.J. Puketza, K. Zhang, M. Chung, B. Mukherjee, R.A. Olsson: A Methodology for Testing Intrusion Detection Systems, IEEE Trans. Softw. Eng. 22(10), 719–729 (1996)

    Article  Google Scholar 

  10. P. Mell, V. Hu, R. Lipmann, J. Haines, M. Zissman: An Overview of Issues in Testing Intrusion Detection Systems, Technical Report NIST IR 7007 (National Institute of Standard and Technology 2003), available http://csrc.nist.gov

    Google Scholar 

  11. D.J. Marchette: Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint (Springer, York, PA 2001), Chap. 3

    MATH  Google Scholar 

  12. M. Mahoney, P. Chan: An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, Proc. 6th International Symposium, Recent Advances in Intrusion Detection (RAID’03) (Pittsburg 2003)

    Google Scholar 

  13. F. Massicotte, F. Gagnon, Y. Labiche, L. Briand, M. Coutre: Automatic Evaluation of Intrusion Detection Systems, Proc. 22nd Annual Computer Security Applications Conference (ACSAC’06) (Miami Beach 2006)

    Google Scholar 

  14. P.E. Proctor: The Practical Intrusion Detection Handbook (Prentice-Hall, Englewood Cliffs 2001) pp. 108–111

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Barry, B., Chan, H. (2010). Intrusion Detection Systems. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04117-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04116-7

  • Online ISBN: 978-3-642-04117-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics