Abstract
The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail. This notion has driven the concept of system security and defined the disciplines of computer and computer network security. Computer network security is made up of three principles: prevention, detection, and response. Although these three are fundamental ingredients of security, most resources have been devoted to detection and prevention because if we are able to detect all security threats and prevent them, then there is no need for response.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sundaram, A. An Introduction to Intrusion Detection, ACM Crossroads: Student Magazine. Electronic Publication. http://www.acm.org/crossroads/xrds2–4/intrus.html.
Kizza, J. M. Computer Network Security and Cyber Ethics. McFarlans Publishers, Jefferson, NC: 2002.
Bauer, K. R. AINT Misbehaving: A Taxonomy of Anti-Intrusion Techniques. http://www.sans.org/newlook/resources/IDFQA/aint.htm.
Handley, M, Paxson V. and Kreibich C. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. http://www.icir.org/vern/papers/normusenix-sec-01-html/norm.html.
Proctor, P. The Practical Intrusion Detection Handbook. Upper Saddle River, NJ: Prentice Hall, 2001.
Innella, P. The Evolution of Intrusion Detection Systems. Tetrad Digital Integrity, LC. http://www.securityfocus.com/infocus/1514.
Mullins, M. Implementing a network intrusion detection system. 16 May 2002. http://www.zdnet.com.au/itmanager/technology/story/0,2000029587,20265285,00.htm.
Central Texas LAN Association Network- vs Host-Based Intrusion Detection. http://www.ctla.org/newsletter/1999/0999nl.pdf.
Panko, R. R. Corporate Computer and Network Security. Upper Saddle River, NJ: Prentice Hall, 2004.
Yee, A. “Network Intrusions: From Detection to Prevention.” International Journal of Information Assurance Professionals, 2003, 8(1).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2013). System Intrusion Detection and Prevention. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4543-1_13
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4543-1_13
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4542-4
Online ISBN: 978-1-4471-4543-1
eBook Packages: Computer ScienceComputer Science (R0)