Skip to main content

System Intrusion Detection and Prevention

  • Chapter
  • First Online:
  • 3160 Accesses

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail. This notion has driven the concept of system security and defined the disciplines of computer and computer network security. Computer network security is made up of three principles: prevention, detection, and response. Although these three are fundamental ingredients of security, most resources have been devoted to detection and prevention because if we are able to detect all security threats and prevent them, then there is no need for response.

This is a preview of subscription content, log in via an institution.

References

  1. Sundaram A (n.d.) An introduction to intrusion detection, ACM Crossroads: Student Magazine. Electronic publication. http://www.acm.org/crossroads/xrds2–4/intrus.html

  2. Kizza JM (2002) Computer network security and cyber ethics. McFarlans Publishers, Jefferson

    Google Scholar 

  3. Bauer KR (n.d.) AINT misbehaving: a taxonomy of anti-intrusion techniques. http://www.sans.org/newlook/resources/IDFQA/aint.htm

  4. Handley M, Paxson V, Kreibich C (n.d.) Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. http://www.icir.org/vern/papers/normusenix-sec-01-html/norm.html

  5. Proctor P (2001) The practical intrusion detection handbook. Prentice Hall, Upper Saddle River

    Google Scholar 

  6. Innella P (n.d.) The evolution of intrusion detection systems. Tetrad Digital Integrity, LC. http://www.securityfocus.com/infocus/1514

  7. Mullins M (2002) Implementing a network intrusion detection system. 16 May 2002. http://www.zdnet.com.au/itmanager/technology/story/0,2000029587,20265285,00.htm

  8. Central Texas LAN Association Network- vs Host-Based Intrusion Detection. http://www.ctla.org/newsletter/1999/0999nl.pdf

  9. Panko RR (2004) Corporate computer and network security. Prentice Hall, Upper Saddle River

    Google Scholar 

  10. Yee A (2003) Network intrusions: from detection to prevention. Int J Inf Assur Prof 8(1)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2015). System Intrusion Detection and Prevention. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6654-2_13

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6653-5

  • Online ISBN: 978-1-4471-6654-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics