An intrusion is defined as any set of actions that attempts to compromise the integrity, the confidentiality, or the availability of a resource. Following the pioneering work of Anderson in 1980 it has been recognised that while computer systems and networks need to be protected from unauthorised external access, using firewalls for example, it is not possible to provide an unconditional guarantee of invulnerability to intrusion. There are a number of reasons for this. One is the extreme diversity of intrusions observed, for example password stealing and cracking, masquerade and sniffer attacks, subversion of security controls (via trapdoors, Trojans etc), denial of service attacks, and malicious codes (viruses, worms, Trojans, logic bombs etc). Another reason is that over 70 per cent of attacks on networks are believed to be internal in origin.
Article navigation
1 March 1998
Review Article|
March 01 1998
Intrusion Detection Systems: Threats, Taxonomy, Tuning Available to Purchase
Publisher: Emerald Publishing
Online ISSN: 1758-7239
Print ISSN: 1359-0790
© MCB UP Limited
1998
Journal of Financial Crime (1998) 6 (1): 49–51.
Citation
Overill RE (1998), "Intrusion Detection Systems: Threats, Taxonomy, Tuning". Journal of Financial Crime, Vol. 6 No. 1 pp. 49–51, doi: https://doi.org/10.1108/eb025861
Download citation file:
Suggested Reading
Guardians of the vault: unmasking online threats and fortifying e-banking security, a systematic review
Journal of Financial Crime (April,2024)
Collaborative data innovation: developing a theoretical and empirical understanding of drivers, barriers and outcomes
International Journal of Public Sector Management (March,2025)
From food defence to food supply chain integrity
British Food Journal (January,2017)
The Trojan Horse of Education
On the Horizon (July,2001)
The Trojan horse mechanism and reciprocal sense-giving to urgent strategic change
Journal of Organizational Change Management (October,2015)
Related Chapters
Human Health Risk Assessment: Guideline Values and Magic Numbers
Assessment and Reclamation of Contaminated Land
Technology Integration: The Trojan Horse for School Reform
Research on Technology in Social Studies Education
Do Japanese investors use their joint ventures with European partners in Europe as Trojan horses to capture Their Knowledge?
Research on Knowledge, Innovation and Internationalization
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
