Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Intrusion Detection System

Cyber Security of Industrial Control Systems in the Future Internet Environment
A hardware and/or software product that monitors network traffic for possible security breaches and issues alerts when suspicious activity is discovered. Possible security breach can be either attacks from outside the organization or attacks or malfeasance from within organizations.
Published in Chapter:
Methodology for Cyber Security Risk Mitigation in Next Generation SCADA Systems
Jasna D. Marković-Petrović (Public Enterprise “Electric Power Industry of Serbia”, Serbia)
DOI: 10.4018/978-1-7998-2910-2.ch002
Abstract
The evolution of architecture of contemporary SCADA systems follows trends in industry sector. Today, SCADA systems imply the application of smart grid and artificial intelligence concepts, the use of IP-based technologies, new mobile devices, as well as the use of private and public cloud computing services. Security risk assessment of contemporary SCADA systems needs to include new security aspects. This chapter analyzes information security in contemporary SCADA systems. Focus is then directed to SCADA network architecture and recommended security mechanisms for mitigating the security risk that assumes the use of Defense in Depth concept. Special attention is paid to SCADA-specific intrusion detection and intrusion prevention technologies. A case study outlines recommendations for security risk mitigation of SCADA system in a hydropower plant.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Novel Intrusion Detection System for Smart Space
Software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet.
Full Text Chapter Download: US $37.50 Add to Cart
Modeling Intrusion Detection with Self Similar Traffic in Enterprise Networks
A computer security system that detects unwantedmanipulations of computer systems, mainly through the Internet.
Full Text Chapter Download: US $37.50 Add to Cart
Agent-Based Intrusion Detection in Wireless Networks
A software or hardware system that automate the process of monitoring the events occurring in a computer system or network, analysing them for signs of security problems. It can monitor and collect data from a target system (host or network), process and correlate the gathered information, and can initiate responses when evidence of an intrusion is detected.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software
A device or software to detect suspicious or malicious activities.
Full Text Chapter Download: US $37.50 Add to Cart
The Analysis of Top Cyber Investigation Trends
A device or software solution that monitors networks and systems for malicious activity.
Full Text Chapter Download: US $37.50 Add to Cart
Enhance Network Intrusion Detection System by Exploiting BR Algorithm as an Optimal Feature Selection
IT is a software, hardware or a combination of both that monitors and collects system and network information and analyzes it to determine if an intrusion has occurred.
Full Text Chapter Download: US $37.50 Add to Cart
Malware Detection in Industrial Scenarios Using Machine Learning and Deep Learning Techniques
A system that analyzes networks or hosts in order to detect anomalous activities.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR