Intrusion prevention systems: How do they prevent intrusion?

Intrusion Prevention Systems are an important component of IT systems defense, and without this technology our data and our networks are much more susceptible to malicious activities.

[1]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[2]  Liu Xiang Network-based intrusion prevention system , 2005 .

[3]  Ray Hunt,et al.  Reactive firewalls - a new technique , 2003, Comput. Commun..

[4]  Filip Schepers,et al.  Network-versus host-based intrusion detection , 1998, Inf. Secur. Tech. Rep..

[5]  Helen Meyer A history of firewall technology , 1997 .

[6]  M. Conway Hackers as terrorists? why it doesn't compute , 2003 .

[7]  Martin P. Loeb,et al.  CSI/FBI Computer Crime and Security Survey , 2004 .

[8]  John Austen Can the laws really cut down hacking? , 1997, Inf. Secur. Tech. Rep..

[9]  John McHugh,et al.  The Role of Intrusion Detection Systems , 2000 .

[10]  Dinesh Sequeira INTRUSION PREVENTION SYSTEMS - SECURITY'S SILVER BULLET? , 2002 .

[11]  Sandeep Kumar Gupta,et al.  Buffer overflow attacks & countermeasures , 2007 .

[12]  Matt Mathis Fragmentation Considered Very Harmful , 2004 .

[13]  Bill Hancock Hackers attack US Government web sites in protest of Chinese embassy bombing , 1999 .

[14]  Duncan Napier IPTables/NetFilter-Linux''s next-generation stateful packet filter , 2001 .

[15]  Rossouw von Solms,et al.  The 10 deadly sins of information security management , 2004, Comput. Secur..

[16]  Bill Hancock,et al.  Security view: A unique Canadian approach - Invite the hacker to nail your networks , 1999 .

[17]  Benjamin A. Kuperman,et al.  A Building Block Approach to Intrusion Detection , 2001 .

[18]  Helen Meyer,et al.  Is network intrusion detection software being used correctly , 1998 .

[19]  Bill Hancock NASA Hacker Pleads Guilty , 2000, Comput. Secur..

[20]  Morgan O apos,et al.  Cyber-extortion evolves , 2004 .

[21]  Ray Hunt,et al.  Security architecture testing using IDS - a case study , 2002, Comput. Commun..

[22]  Eric Miller,et al.  Testing and evaluating computer intrusion detection systems , 1999, CACM.

[23]  Jeffrey C. Mogul,et al.  Simple and Flexible Datagram Access Controls for UNIX-based Gateways , 1999 .

[24]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[25]  Jon David,et al.  Policy enforcement in the workplace , 2002, Comput. Secur..

[26]  Steven Furnell,et al.  Computer hacking and cyber terrorism: the real threats in the new millennium? , 1999, Comput. Secur..

[27]  Ray Hunt,et al.  Intrusion detection techniques and approaches , 2002, Comput. Commun..