Abstract
The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail. This notion has driven the concept of system security and defined the disciplines of computer and computer network security. Computer network security is made up of three principles: prevention, detection, and response. Although these three are fundamental ingredients of security, most resources have been devoted to detection and prevention because if we are able to detect all security threats and prevent them, then there is no need for response.
This is a preview of subscription content, log in via an institution.
References
Sundaram A (n.d.) An introduction to intrusion detection, ACM Crossroads: Student Magazine. Electronic publication. http://www.acm.org/crossroads/xrds2–4/intrus.html
Kizza JM (2002) Computer network security and cyber ethics. McFarlans Publishers, Jefferson
Bauer KR (n.d.) AINT misbehaving: a taxonomy of anti-intrusion techniques. http://www.sans.org/newlook/resources/IDFQA/aint.htm
Handley M, Paxson V, Kreibich C (n.d.) Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. http://www.icir.org/vern/papers/normusenix-sec-01-html/norm.html
Proctor P (2001) The practical intrusion detection handbook. Prentice Hall, Upper Saddle River
Innella P (n.d.) The evolution of intrusion detection systems. Tetrad Digital Integrity, LC. http://www.securityfocus.com/infocus/1514
Mullins M (2002) Implementing a network intrusion detection system. 16 May 2002. http://www.zdnet.com.au/itmanager/technology/story/0,2000029587,20265285,00.htm
Central Texas LAN Association Network- vs Host-Based Intrusion Detection. http://www.ctla.org/newsletter/1999/0999nl.pdf
Panko RR (2004) Corporate computer and network security. Prentice Hall, Upper Saddle River
Yee A (2003) Network intrusions: from detection to prevention. Int J Inf Assur Prof 8(1)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2015). System Intrusion Detection and Prevention. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_13
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6654-2_13
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6653-5
Online ISBN: 978-1-4471-6654-2
eBook Packages: Computer ScienceComputer Science (R0)