This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Sundaram, A. An Introduction to Intrusion Detection,ACM Crossroads: Student Magazine. http://www.acm.org/crossroads/xrds2–4/intrus.html
Kizza, J. M. Computer Network Security and Cyber Ethics. McFarlans Publishers, Jefferson, NC: 2002
Bauer, K. R. AINT Misbehaving: A Taxonomy of Anti-Intrusion Techniques. http://www.sans.org/newlook/resources/IDFQA/aint.htm.
Handley, M, Paxson V. and Kreibich C. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. http://www.icir.org/vern/papers/normusenix-sec-01-html/norm.html
Proctor, P. The Practical Intrusion Detection Handbook. Upper Saddle River, NJ: Prentice Hall, 2001.
Innella, P. The Evolution of Intrusion Detection Systems.Tetrad Digital Integrity, LC. http://www.securityfocus.com/infocus/1514
Fink, G. A., Chappell B. L., Turner T. G., and O’Donoghue K. F.. "A Metric-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems.” Proceedings of WPDRTS, April 15 – 17, 2002, Fort Lauderdale, FL.
Mullins, M. Implementing a network intrusion detection system.16 May 2002. http://www.zdnet.com.au/itmanager/technology/story/0,2000029587,20265285,00.htm
Central Texas LAN Association Network- vs Host-Based Intrusion Detection. http://www.ctla.org/newsletter/1999/0999nl.pdf.
Panko, R. R. Corporate Computer and Network Security. Upper Saddle River, NJ: Prentice Hall, 2004.
FAQ: Network Intrusion Detection Systems. http://www.robertgraham.com/pubs/networkintrusion-detection.html
Yee, A. "Network Intrusions: From Detection to Prevention.” International Journal of Information Assurance Professionals, 2003, 8(1).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag London Limited
About this chapter
Cite this chapter
Kizza, J.M. (2009). System Intrusion Detection and Prevention. In: Kizza, J.M. (eds) A Guide to Computer Network Security. The Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84800-917-2_13
Download citation
DOI: https://doi.org/10.1007/978-1-84800-917-2_13
Publisher Name: Springer, London
Print ISBN: 978-1-84800-916-5
Online ISBN: 978-1-84800-917-2
eBook Packages: Computer ScienceComputer Science (R0)