scholarly journals Burning money with firewalls

2015 ◽  
Vol 56 ◽  
Author(s):  
Ralf C. Staudemeyer ◽  
James Connan

Protecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to constantly vigilant in order to guard against intruders on their networks and groups or individuals that seek to intercept their communications. Companies turn to Firewall and Intrusion Detection System vendors to help them safeguard their information and infrastructure. These companies are putting their faith in expensive devices that attempt to distinguish between friendly and malicious traffic. Despite the expense and complexity of these systems, malicious users seem to find ways to avoid detection and news of massive breaches have become an almost daily occurrence. We propose to fundamentally change the way to look at information security. We highlight some of the fundamental flaws in current systems and expose risks that many experts know, but are not aware of.

2011 ◽  
Vol 460-461 ◽  
pp. 451-454
Author(s):  
Yue Sheng Gu ◽  
Hong Yu Feng ◽  
Jian Ping Wang

Intrusion detection system is an important device of information security. This article describes intrusion detection technology concepts, classifications and universal intrusion detection model, and analysis of the intrusion detection systems weaknesses and limitations. Finally, some directions for future research are addressed.


2017 ◽  
Vol 11 (9) ◽  
pp. 95-108
Author(s):  
Aastha Yadav ◽  
Sarthak Raisurana ◽  
H. Balaji ◽  
P. Lalitha ◽  
Ronnie D. Caytiles ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document