Застосування систем виявлення вторгнень
The article describes the concept of a suspicious event in their study. The stages according to which the research takes place, the process of intrusion prevention are shown. The main stages of deployment of the network IDS sensor are described.
Rolando, M., Rossi, M., Sanarico, N., Mandrioli, D.: A formal approach to sensor placement and configuration in a network intrusion detection system. In: SESS 2006: Proceedings of the 2006 international workshop on Software engineering for secure systems, pp. 65-71. ACM, New York (2006).
The BSD Syslog Protocol, http://www.ietf.org/ rfcZrfc3164.txt.
NIST SP 800-86, Guide to Integrating Forensic Techniques into Incident Response,http://csrc.nist. gov/ publica-tions/nistpubs/
Alan Mainwaring et al, Wireless Sensor Networks for Habitat Monitoring
Noel, S., Jajodia, S.: Attack graphs for sensor placement, alert prioritization, and attack response. In: Cyberspace Research Workshop. (2007)
H. Chen et al, 2009. A Multi-objective Optimisation Approach to IDS Placement. Springer Berlin Heidelberg. http://link.springer.com/chapter/10.1007%2F978-3- 642-04091-7_13#page-1
The Placement of IDS Sensors. Briefing Paper by Kevin Graham. http://www.idsec.co.uk/about/briefings/ids-sensorplacement.html
http://www.ciscopress.com/articles/article.asp?p=2 5327 &seqNum=4
Yi Zou and Krishnendu Chakrabarty (2003). Sensor Deployment and Target Localization Based on Virtual Forces. IeEe INFOCOM 2003
William Stallings & Lawrie Brown. Computer Security: Principles and Practice. Published Aug 2, 2007 by Prentice Hall. ISBN-13: 978-0-13-600424- 0. 1st Edition.
Jan Beutel et al. Deployment Techniques for Sensor Networks. citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1. 1. 156.3388
Argus intrusion detection and prevention. http:// www.qosient.com/argus/, February 2007.
R. Barrett, E. Haber, E. Kandogan, P. Maglio, M. Prabaker, and L. Takayama. Field Studies of Computer System Sdministrators: Analysis of System Management Tools and Practices. In Proc. of the 9 Conference on Computer Supported Collaborative Work, pages 388-395, 2004.
R. Barrett, P. P. Maglio, E. Kandogan, and J. Bailey. Usable autonomic computing systems: The system adminis-trators'perspective. Advanced Engineering Informatics, 19(3): 213-221,2005.
Base: Basic analysis and security engine. http:// sourceforge.net/projects/secureideas, February 2008.
D. Botta, R. Werlinger, A. Gagn'e, K. Beznosov, L. Iverson, S. Fels, and B. Fisher. Towards understanding IT security professionals and their tools. In Proc. of ACM Symposium on Usable Privacy and Security (SOUPS), pages 100-111, Pittsburgh, Pennsylvania, July 18-20 2007.
Bro intrusion detection system. http://bro-ids.org, February 2008.
K. Charmaz. Constructing Grounded Theory. SAGE publications, 2006.
S. Chebrolua, A. Abraham, and J. Thomas. Feature deduction and ensemble design of intrusion detection systems. Computers and Security, 24(4):295-307, 2005.
D. M. Fetterman. Ethnography: Step by Step. Sage Publications Inc., 1998.
S. Furnell and S. Bolakis. Helping us to help ourselves assessing administrators'use of security analysis tools. Network Security, 2:7-12, February 2004.
A. Gagn'e, K. Muldner, and K. Beznosov. Identifying differences between security and other IT professionals: a qualitative analysis. In Proc. of Human Aspects of Information Security and Assurance (HAISA) (to appear, 10 pages), Plymouth, England, July 2008.