Intrusion Detection Systems

Intrusion Detection Systems

H. Gunes Kayacik (Dalhousie University, Canada), A. Nur Zincir-Heywood (Dalhousie University, Canada) and Malcolm I. Heywood (Dalhousie University, Canada)
Copyright: © 2005 |Pages: 6
DOI: 10.4018/978-1-59140-561-0.ch071
OnDemand PDF Download:
No Current Special Offers


Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC© while in 1999, there were 9859 reported incidents (CERT/CC©, 2003). Operations, which are primarily designed to protect the availability, confidentiality, and integrity of critical network information systems, are considered to be within the scope of security management. Security management operations protect computer networks against denial-of-service attacks, unauthorized disclosure of information, and the modification or destruction of data. Moreover, the automated detection and immediate reporting of these events are required in order to provide the basis for a timely response to attacks (Bass, 2000). Security management plays an important, albeit often neglected, role in network management tasks.

Complete Chapter List

Search this Book: