Attack trends in present computer networks

An integral component of security mechanisms in company and governmental networks are Intrusion Detection Systems (IDS), which have been under intensive research for over 30 years. Unfortunately, even with these high-level security measures, the number of security incidents remains on a very high level or even rises. Therefore, for identifying the corresponding weaknesses, an in-depth knowledge of the various kinds of threats and state of the art attacks is necessary. While plenty of research about weaknesses and threats is available for special categories like wireless networks or sensor networks, research with respect to general networks, such as traditional wired networks, is widely neglected. However, the most important real-world harassment affects these networks.

[1]  C. Czosseck,et al.  Requirements for a Future EWS - Cyber Defence in the Internet of the Future , 2011 .

[2]  Thomas A. Longstaff,et al.  A common language for computer security incidents , 1998 .

[3]  Hector Garcia-Molina,et al.  Data Leakage Detection , 2011, IEEE Transactions on Knowledge and Data Engineering.

[4]  Ronald D. Williams,et al.  Taxonomies of attacks and vulnerabilities in computer systems , 2008, IEEE Communications Surveys & Tutorials.

[5]  Marc Dacier,et al.  A revised taxonomy for intrusion-detection systems , 2000, Ann. des Télécommunications.

[6]  D. Pinto Secrets and Lies: Digital Security in a Networked World , 2003 .

[7]  Ali Movaghar-Rahimabadi,et al.  Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.

[8]  Dennis J. Turner,et al.  Symantec Internet Security Threat Report Trends for July 04-December 04 , 2005 .

[9]  David Hylender,et al.  Data Breach Investigations Report , 2011 .

[10]  John McHugh,et al.  Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.

[11]  Yong Wang,et al.  A review of classification methods for network vulnerability , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[12]  Michael McCormick,et al.  Data Theft: A Prototypical Insider Threat , 2008, Insider Attack and Cyber Security.

[13]  Damiano Bolzoni,et al.  Revisiting Anomaly-based Network Intrusion Detection Systems , 2009 .

[14]  Aurobindo Sundaram,et al.  An introduction to intrusion detection , 1996, CROS.

[15]  Robert Koch Towards next-generation Intrusion Detection , 2011, 2011 3rd International Conference on Cyber Conflict.