• Peng Liu
  • Sushil Jajodia
Part of the Advances in Information Security book series (ADIS, volume 4)


Recent exploits by hackers have drawn tremendous attention to the issue of defending against potential information warfare (IW) [whi, 2000]. Our defense and civil institutions rely so heavily on their information systems and networks that the prospect of attacks seriously directed at disabling them could be devastating. Yet, as the hacker attacks have demonstrated, protective mechanisms are fallible. Features and services that must be in place to carry out needed, legitimate functions can be abused by being used in unexpected ways to provide an avenue of attack. Further, an attacker who penetrates one system can use its relationships with other systems on the network to compromise them as well. Such experiences have led to the recognition of the need to detect and react to attacks that succeed in breaching a system’s protective mechanisms.


Intrusion Detection Integrity Constraint Recovery Method Fault Treatment Recovery Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    For some more spectacular examples, see Peter Neumann’s RISKS digest in the newsgroup news: comp. risks or the archive

Copyright information

© Springer Science+Business Media New York 2002

Authors and Affiliations

  • Peng Liu
    • 1
  • Sushil Jajodia
    • 2
    • 3
  1. 1.Department of Information SystemsUniversity of MarylandBaltimore CountyUSA
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityUSA
  3. 3.Department of Information & Software EngineeringGeorge Mason UniversityFairfaxUSA

Personalised recommendations