This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
12.12 References
“FAQ: Network Intrusion Detection Systems.” http://www.robertgraham.com/pubs/network-intrusion-detection.html
Sundaram, Aurobindo. “An Introduction to Intrusion Detection,” ACM Crossroads: Student Magazine. Electronic Publication. http://www.acm.org/crossroads/xrds2-4/intrus.html
Handley, Mark, Vern Paxson and Christian Kreibich. “Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics.” http://www.icir.org/vern/papers/norm-usenix-sec-01-html/norm.html
Mullins, Michael. “Implementing a network intrusion detection system.” 16 May 2002. http://www.zdnet.com.au/itmanager/technology/story/0,2000029587,20265285,00.htm
Central Texas LAN Association “Network-vs Host-Based Intrusion Detection.” http://www.ctla.org/newsletter/1999/0999nl.pdf.
Innella, Paul. “The Evolution of Intrusion Detection Systems.” Tetrad Digital Integrity, LC. http://www.securityfocus.com/infocus/1514
Kizza, Joseph Migga. Computer Network Security and Cyber Ethics. McFarlans Publishers, Jefferson, NC: 2002.
Bauer, Kenneth, R. “AINT Misbehaving: A Taxonomy of Anti-Intrusion Techniques.” (http://www.sans.org/newlook/resources/IDFQA/aint.htm).
Proctor, Paul. The Practical Intrusion Detection Handbook. Upper Saddle River, NJ: Prentice Hall, 2001.
Fink, G.A, B.L. Chappell, T.G. Turner, and K.F. O'Donoghue. “a Metric-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems.” Proceedings of WPDRTS, April 15–17, 2002, Fort Lauderdale, FL.
Yee, Andre. “Network Intrusions: From Detection to Prevention.” International Journal of Information Assurance Professionals, Vol. 8, Issue 1, February 2003.
Panko, Raymond, R. Corporate Computer and Network Security. Upper Saddle River, NJ: Prentice Hall, 2004.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). System Intrusion Detection and Prevention. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_12
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)