dc.contributor.author |
Snapp, S |
|
dc.contributor.author |
Brentano, J |
|
dc.contributor.author |
Dias, G |
|
dc.contributor.author |
Grance, T |
|
dc.contributor.author |
Heberlein, T |
|
dc.contributor.author |
Ho, CL |
|
dc.contributor.author |
Levitt, KN |
|
dc.contributor.author |
Mukherjee, B |
|
dc.contributor.author |
Mansur, DL |
|
dc.contributor.author |
Pon, KL |
|
dc.contributor.author |
Smaha, SE |
|
dc.date.accessioned |
1991T06:36:02Z |
|
dc.date.available |
1991T06:36:02Z |
|
dc.identifier.uri |
http://dl.lib.mrt.ac.lk/handle/123/12215 |
|
dc.description.abstract |
The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solv-ing this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. |
en_US |
dc.relation.uri |
http://www.academia.edu/download/30908716/ss-jb-91.pdf |
en_US |
dc.source.uri |
http://www.academia.edu/download/30908716/ss-jb-91.pdf |
en_US |
dc.title |
A system for distributed intrusion detection |
en_US |
dc.identifier.year |
1991 |
en_US |
dc.identifier.journal |
COMPCOM Spring |
en_US |
dc.identifier.volume |
91 |
en_US |
dc.identifier.pgnos |
170-176 |
en_US |
dc.identifier.email |
[email protected] |
en_US |