By Topic

Information security on Internet enterprise managed intrusion detection system (EMIDS)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
2 Author(s)
M. M. Satti ; Macquarie Corporate Telecommun., Sydney, NSW, Australia ; B. J. Garner

Network security and particularly, Internet security, is at the forefront of business network management and data integrity assurance for network service providers. Confidence in the use of the Internet for business purposes, both business-to-business and business-to-consumer transactions relies on effective authentication and intruder detection processes. Regrettably, the triumph of the Internet design for global information access and sharing is at risk of being tarnished as a ubiquitous open trading environment by unscrupulous and vindictive attacks. Information security is thus the overarching concern of Internet businesses and users! A general security goal is to prevent intrusions. However, no prevention measures can provide adequate security assurance, unless the organization also has an effective strategy for handling intrusion dynamics that include Preparation, Detection and Response. The scope of this paper focuses on the preparation, detection and response phases. The paper also covers, albeit briefly, pre-intrusion planning requirements, hacker perspectives and aims, risk judgements and associated technical methods, such as, foot-printing, scanning, enumeration and then gaining access into the network.

Published in:

Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings. IEEE International

Date of Conference: