scispace - formally typeset
Search or ask a question

Showing papers on "Intrusion detection system published in 1988"


Proceedings ArticleDOI
12 Dec 1988
TL;DR: Haystack is a prototype system for the detection of intrusions in multiuser US Air Force computer systems that reduces voluminous system audit trails to short summaries of user behavior, anomalous events, and security incidents.
Abstract: Haystack is a prototype system for the detection of intrusions in multiuser US Air Force computer systems. Haystack reduces voluminous system audit trails to short summaries of user behavior, anomalous events, and security incidents. This is designed to help the system security officer detect and investigate intrusions, particularly by insiders (authorized users). Haystacks's operation is based on behavioral constraints imposed by security policies and on models of typical behavior for user groups and individual users. >

358 citations


Proceedings ArticleDOI
18 Apr 1988
TL;DR: The design and implementation of a prototype intrusion-detection expert system (IDES) are described, which adaptively learns the normal behavior of each user and detects and reports anomalous user behavior in real time.
Abstract: The design and implementation of a prototype intrusion-detection expert system (IDES) are described. IDES is based on the concept that an intrusion manifests itself as a departure from expected behavior for a user. The prototype monitors users on a remote system, using audit records that characterize their activities. It adaptively learns the normal behavior of each user and detects and reports anomalous user behavior in real time. >

188 citations


Patent
09 Dec 1988
TL;DR: In this paper, the authors describe an emergency action system which is an integrated security control and communications system employed for relatively large and secure installations such as embassies, military buildings and so on.
Abstract: There is described an emergency action system which is an integrated security control and communications system employed for relatively large and secure installations such as embassies, military buildings and so on. The emergency action system apparatus consists of two major subdivisions. A first subdivision is a security and control subsystem which operates to monitor and control sensors and actuators associated with an intrusion detection system. The security and control subsystem handles event logging, generates alarm map displays and switches and distributes surveillance video. The second subdivision of the system is associated with user emergency action consoles which consoles provide the interface and handle voice and data communications to enable the user to interface with the existing communications system as located on the installation as well as with the intrusion detection system. The consoles include direct control circuits which provide for rapid fail safe actuation of various controls throughout the building such as doors and so on. The console contains various displays to enable the user to interface with both systems. This enables the user to control and monitor system operation from a single console which serves to integrate control of both the intrusion detection system as well as the communication system as existing on the premises.

184 citations


Proceedings ArticleDOI
11 Apr 1988
TL;DR: A knowledge- based prototype network intrusion detection expert system (NIDX) for the Unix System V environment that combines knowledge describing the target system, history profiles of users' past activities, and intrusion detection heuristics from a knowledge-based system capable of detecting specific violations that occur on thetarget system.
Abstract: A knowledge-based prototype network intrusion detection expert system (NIDX) for the Unix System V environment is described. NIDX combines knowledge describing the target system, history profiles of users' past activities, and intrusion detection heuristics from a knowledge-based system capable of detecting specific violations that occur on the target system. Intrusions are detected by classifying user activity from a real-time audit trail of Unix system calls and then, using system-specific knowledge and heuristics about typical intrusions and attack techniques, determining whether or not the activity is an intrusion. The authors describe the NIDX knowledge base, and Unix system audit trail mechanism and history profiles , and demonstrate the knowledge-based intrusion detection process. >

80 citations


Patent
29 Sep 1988
TL;DR: In this paper, a dual sensing intrusion detection system includes a passive infrared radiation detection sensor that generates a first output signal in response to the detection of an intruder in the volume of space.
Abstract: A dual sensing intrusion detection system includes a passive infrared radiation detection sensor that generates a first output signal in response to the detection of an intruder in the volume of space. A second detection sensor is directed to the same volume of space and generates a second output signal in response to detection of the intruder. A switch activates the second detection sensor in response to the detection of the intruder by the infrared radiation detector. Logic circuit receives the first and second output signals and produces an alarm signal in response thereto to indicate the detection of the presence of the intruder in the volume of space.

70 citations


Patent
15 Apr 1988
TL;DR: In this article, an intrusion detection system employs a microwave subsystem and a passive infra-red subsystem, both of which must produce an output signal indicative of an intrusion in order for the system to produce an alarm.
Abstract: An intrusion detection system employs a microwave subsystem and a passive infra-red subsystem. Both systems must produce an output signal indicative of an intrusion in order for the system to produce an alarm. There is disclosed a supervision circuit which monitors the number of trips of the microwave system as well as the number of trips of the PIR system. If the number of trips which are indicative of false alarms exceeds preset counts then an alarm is produced indicating that there is a failure in the microwave or the PIR system. The system further monitors the microwave system to determine whether the transmit and receiving diodes are functioning properly. The system will also indicate a fault if an intruder or an object is placed within a predetermined protection dome implemented by the system. Hence the system can produce multiple faults indicative of subsystem failures to notify the user of the system that such a failure has occurred.

44 citations


Patent
29 Jul 1988
TL;DR: In this paper, an intrusion detection system for secure fiber-optic communication systems is described, where a guard signal is transmitted over the optical fiber communication link and both the modal power and modal phase delay of this signal are monitored.
Abstract: Methods and apparatus are disclosed for an intrusion detection system for secure fiber optic communication systems. A guard signal is transmitted over the optical fiber communication link and both the modal power and modal phase delay of this signal are monitored. Intrusions into the link for the purpose of intercepting information being transmitted, cause changes in the modal phase delay and power of the guard signal. These changes, when detected by the monitoring system, indicate the presence of an intruder. A fiber profile which is optimal for both transmission and intrusion detection purposes is described.

30 citations



Patent
29 Nov 1988
TL;DR: A threadably installable intrusion detection unit as mentioned in this paper is a general cylindrical housing with an exterior threaded surface and an end portion formed to receive a screw driver, and an operative intrusion detection element, such as a magnetic or a reed switch, is contained within the hollow interior of the housing.
Abstract: A threadably installable intrusion detection unit. The unit has a generally cylindrical housing with an exterior threaded surface and an end portion formed to receive a screw driver. An operative intrusion detection element, such as a magnetic or a reed switch, is contained within the hollow interior of the housing.

12 citations


Patent
16 Jun 1988
TL;DR: In this paper, an intrusion detection optical communication system modifies the original data signal to include a synchronizing periodic waveform, and the receiver generates an inverted synchronizing waveform signal corresponding with the transmitted signal to null the same under normal operation.
Abstract: An intrusion detection optical communication system modifies the original data signal to include a synchronizing periodic waveform. The receiver generates an inverted synchronizing periodic waveform signal corresponding with the transmitted signal to null the same under normal operation. When an intrusion in the optical system arises, power is extracted from the system and the nulled condition is disrupted. The disruption is detected and activates an alarm circuit when the disruption is above a threshold value.

9 citations


Journal ArticleDOI
TL;DR: Robot autonome permettant d'assurer la securite dans un local en liaison avec un poste de controle même d'informatique ou d'espace automatique.

Proceedings ArticleDOI
05 Oct 1988
TL;DR: This study was motivated by a need to simplify the operation of an existing multisensor perimeter intrusion-detection system, and by a step upward in processing power and storage capacity of small personal computers.
Abstract: This study was motivated by a need to simplify the operation of an existing multisensor perimeter intrusion-detection system, and by a step upward in processing power and storage capacity of small personal computers. The feasibility of centralizing and automating the processing was studied, and telemetry options were examined. While research is still needed to develop key algorithms, bandwidths and data rates have been checked for two processing structures and for perimeters in excess of 10 km and found to be easily within the capability of a centralized 386/1167 processing system. >

Book ChapterDOI
01 Jan 1988
TL;DR: The Denning Sentry I is an autonomous mobile robot configured for use as an electronic security system that can provide comprehensive volume protection of an office building, warehouse, or factory at a lower installation cost than for a fixed intrusion detection system.
Abstract: The Denning Sentry I is an autonomous mobile robot configured for use as an electronic security system. A mobile security robot can provide comprehensive volume protection of an office building, warehouse, or factory at a lower installation cost than for a fixed intrusion detection system. The security robot’s sensor inputs can be correlated to provide a higher probability of detection than uncorrelated sensors generally employed by fixed systems. The security robot’s patrol routes can be modified as customers’ facilities change, without requiring extensive rewiring. Finally, additional sensors can be easily added for detecting fire, smoke, or toxic gases.