This is a Type 3 Technical Report (TR), which defines a framework for detection of intrusions in IT systems. Many classes of intrusions are considered.
These include intrusions that are intentional or unintentional, legal or illegal, harmful or harmless and unauthorized access by insiders or outsiders.
The TR focuses on:
- establishing common definitions for terms and concepts associated with an IT intrusion detection framework,
- describing a generic model of intrusion detection,
- providing high level examples of attempts to exploit systems vulnerabilities,
- discussing common types of input data and the sources needed for an effective intrusion detection capability,
- discussing different methods and combinations of methods of intrusion detection analysis,
- describing activities/actions in response to indications of intrusions.
This framework explains intrusion detection terms and concepts and describes the relationship among them. Further, the framework addresses possible ordering of intrusion detection tasks and related activities.
This TR provides the basis for a common understanding of intrusion detection. This material aims to assist IT managers to deploy within their organizations Intrusion Detection Systems (IDS) that interact and work together.
This TR should facilitate collaboration among organizations across the world where collaboration is desired and/or essential to counter intrusion attempts. This framework document is not intended to cover every possible detail involved in intrusion detection, such as detailed attack patterns, or statistical anomalies, or the many configurations that an IDS could have.
items 1 - of 1 result(s)
View 20 | View 100
Information Technology - Security Techniques - IT Intrusion Detection Framework (Adopted ISO/IEC TR 15947:2002, first edition, 2002-10-15)