A system for distributed intrusion detection
| dc.contributor.author | Snapp, S | |
| dc.contributor.author | Brentano, J | |
| dc.contributor.author | Dias, G | |
| dc.contributor.author | Grance, T | |
| dc.contributor.author | Heberlein, T | |
| dc.contributor.author | Ho, CL | |
| dc.contributor.author | Levitt, KN | |
| dc.contributor.author | Mukherjee, B | |
| dc.contributor.author | Mansur, DL | |
| dc.contributor.author | Pon, KL | |
| dc.contributor.author | Smaha, SE | |
| dc.date.accessioned | 1991T06:36:02Z | |
| dc.date.available | 1991T06:36:02Z | |
| dc.description.abstract | The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solv-ing this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. | en_US |
| dc.identifier.email | gihan@uom.lk | en_US |
| dc.identifier.journal | COMPCOM Spring | en_US |
| dc.identifier.pgnos | 170-176 | en_US |
| dc.identifier.uri | http://dl.lib.mrt.ac.lk/handle/123/12215 | |
| dc.identifier.volume | 91 | en_US |
| dc.identifier.year | 1991 | en_US |
| dc.relation.uri | http://www.academia.edu/download/30908716/ss-jb-91.pdf | en_US |
| dc.source.uri | http://www.academia.edu/download/30908716/ss-jb-91.pdf | en_US |
| dc.title | A system for distributed intrusion detection | en_US |
