Creating and sharing knowledge for telecommunications

Data redundancy may lead to unreliable intrusion detection systems

Al-Rawi, M. ; Al-Zuqary, Y. ; Saghezchi, F. ; Yang, J. ; Bastos, J. B. ; Rodriguez, J.

Data redundancy may lead to unreliable intrusion detection systems, Proc International Wireless Communications and Mobile Computing Conf. - IWCMC, Valencia, Spain, Vol. , pp. - , June, 2017.

Digital Object Identifier:

 

Abstract
Intrusion detection aims at detecting unauthorized access to computers connected through the network, including unauthorized insiders. An Intrusion Detection System (IDS) is based on the assumption that the behavior of the intruder is different from the behavior of a legitimate normal user; hence, an IDS works similar to an intruder alarm. An IDS is either network-based, to protect network information, or host-based to protect a server. Some IDSs can be used to monitor both network connection activity and the stored information on host servers.