Yampolskiy, Roman V. and Govindaraju, Venu. Computer security : a survey of methods and systems [Electronic version]. Journal of Computer Science, 3(7) : 478-486, 2007.
With the continuous evolution of the computer world, computer security is becoming more complicated and new attacks to it are introduced in various forms. This article surveys the different methods and taxonomies in all aspects of computer security such as viruses, attacks, software bugs with special emphasis on Intrusion Detection Systems (IDS) and its evaluation.
The paper introduces various research studies on computer security, Intrusion Detection Systems technologies and products, intrusions, attacks and attackers, flaws and viruses and on the evolution of security tools. Its main purpose is to provide advice and adequate information to security enthusiasts and at the same time would serve as a reference guide for security professionals.
Three(3) things i learned from reading the article :
1. Intrusion Detection Systems (IDS) can be knowledge-based or behavior-based with the first charaterized by matching signatures of well-known attacks and the latter based on user's actions.
2. No IDS is capable of accurately identifying every event occuring on any particular system.
3. The increasing complexity and rapid evolution of modern computer systems prevents obtainment of absolute security.
The latest news on cyber attacks that overwhelmed goverment websites of the US and South Korea mirrors the current dilemma of computer security professionals. It is quite certain that there is no absolute security. Even the biggest economies from where these technologies originated are not spared from such attacks. They are even more vulnerable to security glitches. As computer and network systems infiltrate every aspects of our society, computer security attracts considerable resources from both the research community and from commercial companies. Thus, the use of Intrusion Detection Systems (IDS) and other types of computers security products are being maximized. Although significant to the current dilemma, these systems maybe relative and may become obsolete pertaining to the faster evolution of intrusions and attacks. Attacks may take another form, therefore making IDS incapable of detecting it. We could only hope that IDS could allow a reduction to the number of successful attacks.
With this current situation, I may say that attacks to computer security systems lies on the foundation of human ethical behavior, of computer ethics in particular.