Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Since the explosion of computer systems and computer networks within the past decade, e-commerce, online banking, and other "internet" oriented applications have risen exponentially. According to Forrester Research Group, online shopping in the US grew 580% from 1998 to 2000 accounting for more than $45 billion in sales [10]. Online Banking Report states there are over 100 million people participating in online banking worldwide, an increase of 80% since 1984. This number is expected to rise to 300 million households by 2012 [3]. These applications rely on secure communications for information passing such as credit card numbers and bank account information. The secure communication is realized through the use of cryptography and security protocols for key exchange, authentication etcetera. These protocols can be attacked, possibly resulting in vital information being compromised. This paper discusses classic methodologies concerning intrusion detection and how they are being applied to security protocols. Three methods are presented for detecting and/or preventing intrusions in security protocols. The first method is a simple method aimed at detecting intrusions from attackers with rudimentary skills. The second method, a modified version of the original model, provides a more formidable defense to the sophisticated attacker. Lastly, this paper discusses the third method, IPSec, and how it provides the best security for detecting intrusions in security protocols. Each method is tested with known attacks and the results are discussed.