Integration of Host-based Intrusion Detection Systems into the Tivoli Enterprise Console

For many years, the security has become a main issue in Internet community. Intrusion detection systems (IDSes) are security tools which should indicate when someone is breaking into a system. However, as this thesis shows, the local exploits are not well detected and IDSes generate a huge amount of data that should not always be considered as intrusion. There is no universal IDS, all IDSes have different strengths and weaknesses. The detection of intrusion can be improved by correlating different information sources and by considering the environment in which they occur.

By: Christian Gigandet

Published in: RZ3253 in 2000

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rz3253.pdf

Questions about this service can be mailed to reports@us.ibm.com .