Abstract
Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process to identify intrusions. Intrusion detection has been studied for over 20 years, since Anderson’s report [Anderson, 1980]. It is based on the beliefs that an intruder’s behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science+Business Media New York
About this chapter
Cite this chapter
Ning, P., Jajodia, S., Wang, X.S. (2004). An Overview of Related Research. In: Intrusion Detection in Distributed Systems. Advances in Information Security, vol 9. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-0467-2_2
Download citation
DOI: https://doi.org/10.1007/978-1-4615-0467-2_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-5091-0
Online ISBN: 978-1-4615-0467-2
eBook Packages: Springer Book Archive