Skip to main content

System Intrusion Detection and Prevention

  • Chapter
  • First Online:

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail. This notion has driven the concept of system security and defined the disciplines of computer and computer network security. Computer network security is made up of three principles: prevention, detection, and response. Although these three are fundamental ingredients of security, most resources have been devoted to detection and prevention because if we are able to detect all security threats and prevent them, then there is no need for response.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sundaram, A. An Introduction to Intrusion Detection, ACM Crossroads: Student Magazine. Electronic Publication. http://www.acm.org/crossroads/xrds2–4/intrus.html.

  2. Kizza, J. M. Computer Network Security and Cyber Ethics. McFarlans Publishers, Jefferson, NC: 2002.

    Google Scholar 

  3. Bauer, K. R. AINT Misbehaving: A Taxonomy of Anti-Intrusion Techniques. http://www.sans.org/newlook/resources/IDFQA/aint.htm.

  4. Handley, M, Paxson V. and Kreibich C. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. http://www.icir.org/vern/papers/normusenix-sec-01-html/norm.html.

  5. Proctor, P. The Practical Intrusion Detection Handbook. Upper Saddle River, NJ: Prentice Hall, 2001.

    Google Scholar 

  6. Innella, P. The Evolution of Intrusion Detection Systems. Tetrad Digital Integrity, LC. http://www.securityfocus.com/infocus/1514.

  7. Mullins, M. Implementing a network intrusion detection system. 16 May 2002. http://www.zdnet.com.au/itmanager/technology/story/0,2000029587,20265285,00.htm.

  8. Central Texas LAN Association Network- vs Host-Based Intrusion Detection. http://www.ctla.org/newsletter/1999/0999nl.pdf.

  9. Panko, R. R. Corporate Computer and Network Security. Upper Saddle River, NJ: Prentice Hall, 2004.

    Google Scholar 

  10. Yee, A. “Network Intrusions: From Detection to Prevention.” International Journal of Information Assurance Professionals, 2003, 8(1).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2013). System Intrusion Detection and Prevention. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4543-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4543-1_13

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4542-4

  • Online ISBN: 978-1-4471-4543-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics