Chapter 26
Intrusion Detection
HIPPOLYTA: How chance Moonshine is gone before Thisbe comes back and finds her lover?THESUS: She will find him by starlight. Here she comes; and her passion ends the play.
— A Midsummer Night’s Dream, V, i, 320–323.
System managers must protect computer systems from attack. The mechanisms and techniques discussed throughout this book help protect systems, data, and resources. However, nothing is perfect. Even the best protected systems must be monitored to detect successful (and unsuccessful) attempts to breach security. This chapter discusses automated systems for detecting intrusions.
26.1 Principles
Computer systems that are not under attack exhibit several characteristics.
The actions of users and processes ...
Get Computer Security Art and Science, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.