ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Distributed Approach of Intrusion Detection System: Survey

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 6)

Publication Date:

Authors : ;

Page : 358-363

Keywords : Intrusion-Detection; Mobile Agents; Network Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Intrusion Detection Systems (IDS) are now becoming one of burning issue for any organization’s network. Intruders always search for vulnerabilities or flaws in target system and attack using different techniques. An intrusion detection system (IDS) is needed to detect and respond effectively whenever the confidentiality, integrity, and availability of computer resources are under attack. Today, number of open sources and commercial Intrusion Detection Systems are available to match organization’s requirements but the performance of these Intrusion Detection Systems is still the main concern. In this paper, we have analyzed the performance and applicability of the well knows IDS system based on mobile agent with their pros and cons. Mobile agent is efficient way to find out the intruder in distributed system. The main features of mobile agents are intelligence and mobility which is the core motivation to us to designed cost. The aim of this review work is to help to select appropriate IDS systems as per their requirement and application.

Last modified: 2013-01-26 20:52:40