A revised taxonomy for intrusion-detection systems

Citation
H. Debar et al., A revised taxonomy for intrusion-detection systems, ANN TELECOM, 55(7-8), 2000, pp. 361-378
Citations number
71
Categorie Soggetti
Information Tecnology & Communication Systems
Journal title
ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS
ISSN journal
00034347 → ACNP
Volume
55
Issue
7-8
Year of publication
2000
Pages
361 - 378
Database
ISI
SICI code
0003-4347(200007/08)55:7-8<361:ARTFIS>2.0.ZU;2-2
Abstract
Intrusion-detection systems aim at detecting attacks against computers syst ems and networks, or in general against information systems. Indeed it is d ifficult to provide provably secure information systems and to maintain the m in such a secure state during their lifetime and utilization. Sometimes, legacy or operational constraints do not even allow the definition of a ful ly secure information system. Therefore, intrusion-detection systems have t he task of monitoring the usage of such systems to detect apparition of ins ecure states. They detect attempts and active misuse, either by legitimate users of the information systems or by external parties, to abuse their pri vileges or exploit security vulnerabilities. In a previous paper [Computer networks 31, 805-822 (1999)], we introduced a taxonomy of intrusion-detecti on systems that highlights the various aspects of this area. This paper ext ends the taxonomy beyond real-time intrusion detection to include additiona l aspects of security monitoring, such as vulnerability assessment.