Current Challenges in Intrusion Detection Systems

Current Challenges in Intrusion Detection Systems

H. Gunes Kayacik (Dalhousie University, Canada) and A. Nur Zincir-Heywood (Dalhousie University, Canada)
DOI: 10.4018/978-1-60566-060-8.ch031
OnDemand PDF Download:
No Current Special Offers


Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 1995, 171 vulnerabilities were reported to CERT/CC © while in 2003, there were 3,784 reported vulnerabilities, increasing to 8,064 in 2006 (CERT/CC©, 2006). Operations, which are primarily designed to protect the availability, confidentiality, and integrity of critical network information systems are considered to be within the scope of security management. Security management operations protect computer networks against denial-of-service attacks, unauthorized disclosure of information, and the modification or destruction of data. Moreover, the automated detection and immediate reporting of these events are required in order to provide the basis for a timely response to attacks (Bass, 2000). Security management plays an important, albeit often neglected, role in network management tasks.

Complete Chapter List

Search this Book: