Skip to main content

Intrusion Detection Systems

  • Living reference work entry
  • First Online:
Encyclopedia of Security and Emergency Management
  • 499 Accesses

Definition

An Intruder Detection System (IDS) is an automated technology designed and implemented to detect and communicate the presence of a person or object in a designated zone. IDS provides the detection element in a security system which holistically deters, detects, delays, and responds.

Introduction

Intrusion Detection Systems (IDS) have become a protection norm in both domestic and commercial premises, driven by cost reductions, a user-pay approach to security, and an increased perceived need (Brooks 2014). Such a need is driven in part by burglary risks, a “high-volume crime that impacts upon the well-being of the general public” (Mawby 2007). While no IDS can physically prevent a theft, they do notify of such activity. As a result, IDS have become a common method of protection. Therefore, this entry introduces IDS, its principle and geometry of detection, taxonomies of sensing detectors, and applied levels of protection.

What Is an Intrusion Detection System?

IDS have many...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Abaimov, S., & Martellini, M. (2017). Selected issues of cyber security practices in CBRNeCy critical infrastructure. In M. Maurizio & A. Malizia (Eds.), Cyber and chemical, biological, radiological, nuclear, explosives challenges: Threats and counter efforts. Cham: Springer.

    Google Scholar 

  • Brooks, D. J. (2014). Intrusion detection systems in the protection of assets. In M. Gill (Ed.), The handbook of security (2nd ed., pp. 683–704). Basingstoke: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Garcia, M. L. (2008). The design and evaluation of physical protection systems (2nd ed.). Burlington: Butterworth-Heinemann.

    Google Scholar 

  • Mawby, R. I. (Ed.). (2007). Burglary. Aldershot: Ashgate Publishing Group.

    Google Scholar 

  • Smith, C. L., & Brooks, D. J. (2013). Security science: The theory and practice of security. Waltham, MA: Elsevier.

    Google Scholar 

  • Standards Australia. (2007). AS/NZS 2201 intruder alarm systems – Part 1: Client’s premises-design, installation, commissioning and maintenance. Sydney: Standards Australia.

    Google Scholar 

  • Underwood, G. (1984). The security of buildings. London: Butterworths.

    Google Scholar 

  • Walsh, T. J., & Healy, R. J. (2012). Protection of assets. Alexandria: ASIS International.

    Google Scholar 

  • Wyss, G. D. (2009). Quantifying the degree of balance in physical protection systems. Albuquerque: Sandia National Laboratories.

    Google Scholar 

Further Reading

  • Brooks, D. J. (2014). Intrusion detection systems in the protection of assets. In M. Gill (Ed.), The handbook of security (2nd ed., pp. 683–704). Basingstoke: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Garcia, M. L. (2008). The design and evaluation of physical protection systems (2nd ed.). Burlington: Butterworth-Heinemann.

    Google Scholar 

  • Smith, C. L., & Brooks, D. J. (2013). Chapter 6 detection systems. In Security science: The theory and practice of security (pp. 129–152). Burlington: Butterworth-Heinemann.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David J. Brooks .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Brooks, D.J., Coole, M. (2019). Intrusion Detection Systems. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_161-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69891-5_161-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69891-5

  • Online ISBN: 978-3-319-69891-5

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics