Article ID: CBB570334134

The March of IDES: Early History of Intrusion-Detection Expert Systems (2016)

unapi

As part of a broader prehistory and history of early intrusion-detection systems (IDSs), this article focuses on the first such system, Intrusion Detection Expert System (IDES), which was developed in the second half of the 1980s at SRI International (and SRI's follow-on Next Generation Intrusion Detection Expert System, or NIDES, in the early-to-mid 1990s). It also briefly recounts other early IDSs and the National Security Agency's Computer Misuse and Anomaly Detection (CMAD) Program, and it analyzes the disproportionately high contributions of women scientists to leadership in IDS research and development relative to other computer security specialties.

...More
Included in

Article Yost, Jeffrey R. (2016) Computer Security, Part 2 -- Editor's Introduction. IEEE Annals of the History of Computing (pp. 10-11). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB570334134/

Similar Citations

Article Aspray, William F.; Cortada, James W.; (2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999 (/isis/citation/CBB189385729/)

Article Kneuper, Ralf; (2017)
Sixty Years of Software Development Life Cycle Models (/isis/citation/CBB236951329/)

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Article Misa, Thomas J.; (2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970) (/isis/citation/CBB851516279/)

Article Yost, Jeffrey R.; (2016)
Computer Security, Part 2 -- Editor's Introduction (/isis/citation/CBB453922047/)

Review Salem Elzway; (2017)
Review of "The Outsourcer: The story of India's IT revolution" (/isis/citation/CBB610334077/)

Article Nyman, Linus; Laakso, Mikael; (2016)
Anecdote: Notes on the History of Fork and Join (/isis/citation/CBB424414308/)

Article Peter Andras; Lukas Esterle; Michael Guckert; The Anh Han; Peter R. Lewis; Kristina Milanovic; Terry Payne; Cedric Perret; Jeremy Pitt; Simon T. Powers; Neil Urquhart; Simon Wells; (December 2018)
Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems (/isis/citation/CBB573643849/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB486585682/)

Book Brian Hochman; (2022)
The Listeners: A History of Wiretapping in the United States (/isis/citation/CBB775086796/)

Book Duane C. Wilson; (2021)
Cybersecurity (/isis/citation/CBB201310866/)

Article Baker, Kevin T.; (2017)
Simulation and “Seduction” at the Policy Interface (/isis/citation/CBB450364367/)

Review McCray, W. Patrick; (2016)
Review of "Inside the Machine: Art and Invention in the Electronic Age" (/isis/citation/CBB765321999/)

Article Smith, Alvy Ray; (2016)
The Dawn of Digital Light (/isis/citation/CBB962237102/)

Book Yost, Jeffrey R.; (2005)
The computer industry (/isis/citation/CBB001180688/)

Article Ensmenger, Nathan; (2017)
From the Editor's Desk (/isis/citation/CBB143265022/)

Authors & Contributors
Yost, Jeffrey R.
Cortada, James W.
Neil Urquhart
The Anh Han
Brian Hochman
Terry Payne
Concepts
History of Computing
Software
Computer security; cyber security
Security technologies
Technology and government
Computer industry
Time Periods
20th century
21st century
20th century, late
Modern
19th century
Places
United States
India
Institutions
Control Data Corporation
Peter Norton Computing Corporation
Symantec Corporation
United States. Securities and Exchange Commission
Club of Rome
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment