Article | REF: H5840 V1

Intrusion detection and analysis

Author: Hervé DEBAR

Publication date: October 10, 2004

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


Overview

Français

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHOR

  • Hervé DEBAR: Senior Expert, France Télécom R&D

 INTRODUCTION

The development of information technology has been accompanied by security problems. Initially, viruses spread slowly through the exchange of computer media. With the advent of the first TCP/IP networks, security problems diversified and led to the development of new security techniques.

Very early in the development of the Internet, vulnerabilities in operating systems enabled attackers to move virtually from system to system. In the military context of TCP/IP network deployment, the detection of malicious actions quickly became a necessity. Preventive measures proved insufficient, and led to the creation of intrusion detection systems (IDS).

These systems have been developed to detect abnormal operation of information systems and networks, indicating that actions are being taken by one or more users that do not comply with security policy. Two families of analysis techniques have been developed for this purpose. The first family of analysis techniques assumes that it is possible to differentiate the behavior of an attacker from the usual behavior of the information system under surveillance. The second family exploits accumulated knowledge of vulnerabilities and ways of penetrating information systems; when user actions resemble previously described attacks, the intrusion detection system transmits an alert.

These analysis techniques apply to different data sources, which must be acquired by the intrusion detection system (network listening or file reading, for example), and pre-processed to simplify analysis.

The main purpose of intrusion detection systems today is to provide operators with information on the health of the information system being monitored. However, as analysis techniques evolve and become more reliable, it may be possible in a few years' time to develop more sophisticated protection systems than those currently available. In particular, it should become possible to protect each service offered by an information system individually, without being tied to network access points, as is the case today with widespread firewall technology.

You do not have access to this resource.

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


The Ultimate Scientific and Technical Reference

A Comprehensive Knowledge Base, with over 1,200 authors and 100 scientific advisors
+ More than 10,000 articles and 1,000 how-to sheets, over 800 new or updated articles every year
From design to prototyping, right through to industrialization, the reference for securing the development of your industrial projects

This article is included in

Security of information systems

This offer includes:

Knowledge Base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

Practical Path

Operational and didactic, to guarantee the acquisition of transversal skills

Doc & Quiz

Interactive articles with quizzes, for constructive reading

Subscribe now!

Ongoing reading
Intrusion detection and analysis