DHSS 2013 Proceeding

Modelling intrusion detection in security systems

Authors:   Zenon Chaczko, Ryszard Klempous, Chris Chiu

Abstract

With the ever increasing wireless connectivity and complexity of infrastructure-oriented systems, security is a very important issue for all network-based infrastructures in a modern enterprise environment. There are many examples of intruders and attackers who made successful attempts to seriously affect assets of high-profile organisations and companies. In some cases, the entire infrastructure of a company was brought down, resulting in a prolonged disablement of business, provided services, loss of money and reputation. Many methods, techniques and tools have been developed to secure the assets, network infrastructure and communication of various organisations. Intrusion detection is a relatively new addition to such methods, hence the tools that use advanced intrusion detection techniques started to appear only recently. Using intrusion detection methods, we are able to collect and use information from known types of attacks and find out if someone is trying or even attempting to penetrate our infrastructure or attack our assets. The information collected and accumulated in this way can then be used to harden the infrastructure/network security of the organisation/enterprise and possibly can be used for legal cases. This paper aims to present various issues related to security services, describes methods, techniques used in intrusion detection that can be useful when building and designing effective security systems.

I3M  Scientific Sponsors

I3M  Industrial Sponsors

I3M  Media Sponsors