Intrusion Detection and Response

Intrusion Detection and Response

David A. Dampier, Ambareen Siraj
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
DOI: 10.4018/978-1-59904-937-3.ch123
Cite Chapter Cite Chapter

MLA

Dampier, David A., and Ambareen Siraj. "Intrusion Detection and Response." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 1795-1805. https://doi.org/10.4018/978-1-59904-937-3.ch123

APA

Dampier, D. A. & Siraj, A. (2008). Intrusion Detection and Response. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 1795-1805). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch123

Chicago

Dampier, David A., and Ambareen Siraj. "Intrusion Detection and Response." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 1795-1805. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch123

Export Reference

Mendeley
Favorite

Abstract

This chapter discusses the notion of intrusion detection and introduces concepts associated with intrusion detection and methods used to respond to intrusions. It presents information about different forms of intrusions and how they are recognized. It introduces methods for detecting intrusions and then discusses possible responses to those intrusions. It is hoped that this information will make the readers more aware of the possibility of intrusions and how they might develop a process for detecting and responding to these intrusions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.