1. National Institute of Standards and Technology (NIST). (2020). Security and Privacy Controls for Information Systems and Organizations (NIST Special Publication 800-53
Revision 5). Section 3.3
Control SI-4
"System Monitoring
" describes the function of monitoring systems to "detect attacks and indicators of potential attacks" and "unauthorized local
network
and remote connections
" which is the core purpose of an IDS as a detective control. (p. 299).
2. Bauer
L. (2019). 18-730: Introduction to Computer Security
Lecture 2: Security Policies & Controls. Carnegie Mellon University. Slide 19
"Types of Controls
" explicitly categorizes "Intrusion detection systems" under the "Detective" control type.
3. Saltzer
J. H.
& Schroeder
M. D. (1975). The Protection of Information in Computer Systems. Communications of the ACM
18(7)
387–408. This foundational paper discusses security principles. While it doesn't use the modern "detective" term
it describes the principle of "audit trail" (Section I.A.5)
which is the basis for detective controls like IDS that analyze activity logs to detect intrusions. DOI: https://doi.org/10.1145/361011.361062