Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Intrusion Detection

Handbook of Research on Wireless Security
Intrusion detection is the process of identifying and distinguishing malicious behavior from the normal network traffic.
Published in Chapter:
Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks
John Felix Charles Joseph (Nanyang Technological University, Singapore), Amitabha Das (Nanyang Technological University, Singapore), Boon-Chong Seet (Auckland Univerisity of Technology, New Zealand), and Bu-Sung Lee (Nanyang Technological University, Singapore)
Copyright: © 2008 |Pages: 16
DOI: 10.4018/978-1-59904-899-4.ch033
Abstract
Intrusion detection in ad hoc networks is a challenge because of the inherent characteristics of these networks, such as, the absence of centralized nodes, the lack of infrastructure, and so forth. Furthermore, in addition to application-based attacks, ad hoc networks are prone to attacks targeting routing protocols. Issues in intrusion detection in ad hoc networks are addressed by numerous research proposals in literature. In this chapter, we first enumerate the properties of ad hoc networks which hinder intrusion detection systems. After that, significant intrusion detection system (IDS) architectures and methodologies proposed in the literature are elucidated. Strengths and weaknesses of these works are studied and are explained. Finally, the future directions which will lead to the successful deployment of intrusion detection in ad hoc networks are discussed.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
An Auto-Reclosing-Based Intrusion Detection Technique for Enterprise Networks
A traditional technique which detects actions that attempt to compromise the confidentiality and integrity of a resource in information security. It is used only after an attack has already entered a given system.
Full Text Chapter Download: US $37.50 Add to Cart
Using Deep Learning and Big Data Analytics for Managing Cyber-Attacks
The process of monitoring and analysing events in a computer system or network for indicators of intrusions, which are described as attempts to circumvent a computer's or network's security systems (compromise the security, integrity, and availability of information resources).
Full Text Chapter Download: US $37.50 Add to Cart
Machine Automation Making Cyber-Policy Violator More Resilient: A Proportionate Study
It is an uncovering scheme of hardware devices or software program for analyzing host to its corresponding network and policy violator. It helps us to gather the data of malicious or violated actions centrally in well-defined manner.
Full Text Chapter Download: US $37.50 Add to Cart
A Comparative Study of Attacks, Security Mechanisms, Preventive Measures, and Challenges in Wireless Sensor Networks
Intrusion detection (ID) is a type of security management system. An ID system gathers and analyzes information from various areas within a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization).
Full Text Chapter Download: US $37.50 Add to Cart
Scheduling Large-Scale DNA Sequencing Applications
Intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Ad Hoc Network and Computing Paradigms
A mechanism to monitor network and system related activities for any malicious behavior and policy violation.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey on Network Intrusion Detection Using Deep Generative Networks for Cyber-Physical Systems
An intrusion detection system is a system that monitors network traffic for suspicious activity, and issues alert when such action is discovered. While anomaly detection and reporting is the primary function.
Full Text Chapter Download: US $37.50 Add to Cart
Rapid E-Learning in the University
Attempts to discover attacks while they are in progress, or at least discover them before much damage has been done.
Full Text Chapter Download: US $37.50 Add to Cart
Threat Detection in Cyber Security Using Data Mining and Machine Learning Techniques
The classification and response to attacks or violations of the security policies automatically, at network and host levels, in cyber infrastructure in a manner to preserve the Integrity, Confidentiality and availability of the infrastructure.
Full Text Chapter Download: US $37.50 Add to Cart
Real Time Internal Intrusion Detection: A Case Study of Embedded Sensors and Detectors in E-Government Websites
Full Text Chapter Download: US $37.50 Add to Cart
Security in Mobile Ad Hoc Networks
The techniques or processes of detecting inappropriate, incorrect, or anomalous activities.
Full Text Chapter Download: US $37.50 Add to Cart
UWDBCSN Analysis During Node Replication Attack in WSN
Intrusion detection is a process of detecting any unnecessary activity in the network.
Full Text Chapter Download: US $37.50 Add to Cart
Contextual Anomaly Detection Methods for Addressing Intrusion Detection
A computer network monitoring method to detect malicious activity.
Full Text Chapter Download: US $37.50 Add to Cart
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
Intrusion detection is the process of identifying attacks or attack attempts. This process could be performed either manually or automatically.
Full Text Chapter Download: US $37.50 Add to Cart
Introduction to Computer Forensics in the Age of Information Warfare
Software that monitors systems and network resources that notifies network security personnel when it sees a possible instruction.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR