68
Views
6
CrossRef citations to date
0
Altmetric
Linking to Data

Intrusion Detection Technology: Leveraging the Organization's Security Posture

References

  • Jackson , K . 1999 . Intrusion Detection System (IDS) Product Survey, Product Survey by the Los Alamos National Laboratory , LA-UR-99-3883
  • Boulanger , A. 1998 . Catapults and Grappling Hooks: The Tools and Techniques of Information Warfare . IBM Systems Journal , 37 ( 1 ) : 106 – 114 . Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web: http://www.epnet.com
  • National Institute of Standards and Technology (NIST) . May 1999 . ITL Bulletin — Computer Attacks: What They Are and How to Defend Against Them May , Retrieved March 20, 2001, from the World Wide Web: http://www.nist.gov/itl/lab/bulletns/may99.htm
  • Hurwicz , M. 1998 . Cracker Tracking: Tighter Security with Intrusion Detection . Byte , 23 ( 5 ) : 112 – 116 . Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web: http://www.epnet.com
  • Ashley , P. and Vandenwauver , M. 1999 . Practical Intranet Security — Overview of the State of the Art and Available Technologies , Boston : Kluwer Academic Publishers .
  • Bace , R. 1999 . An Introduction to Intrusion Detection and Assessment , ICSA, Inc. White Paper . Retrieved March 20, 2001, from the World Wide Web: http://www.icsa.net/html.communities/ids/White%20Paper/index.shtml
  • National Institute of Standards and Technology (NIST) . November 1999 . ITL Bulletin — Acquiring and Deploying Intrusion Detection Systems November , Retrieved March 20, 2001, from the World Wide Web: http://www.nist. gov/itl/lab/bulletns/nov99.htm
  • Phoenix Health Systems . 2001 . HIPAAdvisory — HIPAAtech: Intrusion Detection Retrieved March 20, 2001, from the World Wide Web: http://www.hipaadvisory. com/tech/IntrusionDetection.htm
  • Richards , K. 1999 . Network Based Intrusion Detection: A Review of Technologies . Computers & Security , 18 : 671 – 682 .
  • Cisco Systems, Inc. 2001 . Defining Strategies to Protect against TCP SYN Denial of Service Attacks, White Paper Retrieved March 9, 2001, from the World Wide Web: http://cio.cisco.com/warp/public/707/4.html
  • Velissaris , J. and Santarossa , R. 1999 . Practical Security Issues with High-Speed Networks . Journal of High Speed Networks , 8 ( 4 ) : 311 – 324 . Retrieved March 17, 2001, from the EBSCOhost database on the World Wide Web: http://www.epnet.com
  • O'Leary , D. 1992 . Intrusion-Detection Systems . Journal of Information Systems , 6 ( 1 ) : 63 – 74 . Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web: http://www.epnet.com

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.