A Survey of Intrusion Detection Techniques
Author
Teresa F. Lunt
Entry type
article
Abstract
Today's computer systems are vulnerable both to abuse by insiders and to
penetration by outsiders, as evidenced by the growing number of incidents reported
in the press. To close all security loopholes from today's systems is infeasible, and
no combination of technologies can prevent legitimate users from abusing their
authority in a system; thus auditing is viewed as the last line of defense.
Over the past several years, the computer security community has been developing
automated tools to analyze computer system audit data for suspicious user behavior.
This paper describes the use of such tools for detecting computer system intrusion
and describes futher technologies that may be of use for intrusion detection in the
future.
Date
1993 – June
Institution
Elsevier Science Publishers Ltd.
Journal
Computers & Security
Key alpha
Lunt
Number
4
Pages
405-418
Volume
12
Publication Date
0000-00-00
Location
A hard-copy of this is in the Papers Cabinet

