A conceptual architecture for real‐time intrusion monitoring

Article Properties
Abstract
Cite
Furnell, Steven M., and Paul S. Dowland. “A Conceptual Architecture for real‐time Intrusion Monitoring”. Information Management &Amp; Computer Security, vol. 8, no. 2, 2000, pp. 65-75, https://doi.org/10.1108/09685220010321317.
Furnell, S. M., & Dowland, P. S. (2000). A conceptual architecture for real‐time intrusion monitoring. Information Management &Amp; Computer Security, 8(2), 65-75. https://doi.org/10.1108/09685220010321317
Furnell SM, Dowland PS. A conceptual architecture for real‐time intrusion monitoring. Information Management & Computer Security. 2000;8(2):65-7.
Description

Can proactive monitoring effectively combat unauthorized IT system activities? This paper explores the principles of intrusion monitoring and presents a conceptual architecture for a real-time Intrusion Monitoring System (IMS). Addressing the limitations of traditional authentication methods, the IMS aims to provide proactive monitoring and automatic responses to suspected security breaches. The paper describes the main functional elements of the IMS architecture and discusses practical implementation considerations. It examines the potential advantages and disadvantages of this approach, offering insights into its effectiveness. This research suggests that an IMS-type system could complement conventional security controls. While not a complete replacement, it offers an effective means to enhance protection and improve overall IT security. The study's findings have important implications for organizations seeking to strengthen their defenses against both external and internal threats.

This paper contributes to the field of information security and computer security, consistent with the scope of Information Management & Computer Security. By proposing a conceptual architecture for intrusion monitoring, it addresses the ongoing challenges of safeguarding IT systems from unauthorized activities, a central theme within the journal.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled Authentication and Supervision: A Survey of User Attitudes and was published in 2000. The most recent citation comes from a 2018 study titled Authentication and Supervision: A Survey of User Attitudes . This article reached its peak citation in 2018 , with 1 citations.It has been cited in 8 different journals, 12% of which are open access. Among related journals, the Computers & Security cited this research the most, with 3 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year