Modelling intrusion detection in security systems
- Publication Type:
- Conference Proceeding
- 3rd International Defense and Homeland Security Simulation Workshop, DHSS 2013, Held at the International Multidisciplinary Modeling and Simulation Multiconference, I3M 2013, 2013, pp. 41 - 46
- Issue Date:
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
With the ever increasing wireless connectivity and complexity of infrastructure-oriented systems, security is a very important issue for all network-based infrastructures in a modern enterprise environment. There are many examples of intruders and attackers who made successful attempts to seriously affect assets of high-profile organisations and companies. In some cases, the entire infrastructure of a company was brought down, resulting in a prolonged disablement of business, provided services, loss of money and reputation. Many methods, techniques and tools have been developed to secure the assets, network infrastructure and communication of various organisations. Intrusion detection is a relatively new addition to such methods, hence the tools that use advanced intrusion detection techniques started to appear only recently. Using intrusion detection methods, we are able to collect and use information from known types of attacks and find out if someone is trying or even attempting to penetrate our infrastructure or attack our assets. The information collected and accumulated in this way can then be used to harden the infrastructure/network security of the organisation/enterprise and possibly can be used for legal cases. This paper aims to present various issues related to security services, describes methods, techniques used in intrusion detection that can be useful when building and designing effective security systems. Copyright© (2013) by CAL-TEK S.r.l.
Please use this identifier to cite or link to this item: