INTRUSION DETECTION SYSTEMS. TECHNIQUES AND TOOLS
Assoc. Prof. Sorin Popa Ph. D and
Additional contact information
Assoc. Prof. Sorin Popa Ph. D: University of Craiova Faculty of Economics and Business Administration Craiova, Romania
Annals of University of Craiova - Economic Sciences Series, 2010, vol. 2, issue 38, 10
Attacks on the computer infrastructures are becoming an increasingly serious problem. There are available several information security techniques and tools to protect valuable information stored on computer systems against unauthorized access, use and destruction. This paper offers a perspective on the current state of Intrusion Detection Systems (IDS) describing the functionalities and components of such systems. A classification based on the type of protected system is made, along with the particular use of each of them. Further, it investigates the main techniques used to detect intruders, revealing the modality for discovering abnormal system events. Finally, the focus is on different types of intrusion detection tools available, few examples of them being presented.
Keywords: intrusion detection; abnormal events; audit trail analysis; real-time analysis (search for similar items in EconPapers)
JEL-codes: C83 C88 (search for similar items in EconPapers)
References: View complete reference list from CitEc
Citations: Track citations by RSS feed
Downloads: (external link)
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
Persistent link: https://EconPapers.repec.org/RePEc:aio:aucsse:v:2:y:2010:i:10:p:408-417
Access Statistics for this article
Annals of University of Craiova - Economic Sciences Series is currently edited by Sorinel Domnisoru
More articles in Annals of University of Craiova - Economic Sciences Series from University of Craiova, Faculty of Economics and Business Administration Contact information at EDIRC.
Bibliographic data for series maintained by Anca Bandoi ().