Classification and Analysis of Techniques Applied in Intrusion Detection Systems
Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.6, No. 7)Publication Date: 2017-07-01
Authors : Calpephore NKIKABAHIZI Dr Wilson Cheruiyot Dr Ann Kibe;
Page : 216-219
Keywords : Data mining; IDS; normalization;
Abstract
Currently, the development of most of organizations depends on technology for mining information, storing and its transactions. But these frequent use online technologies make the data to be exposed to the risk of attacks that compromise the normal activities of systems. To protect and prevent these attacks, the researchers had implemented the intrusion detection systems (IDS). Even the IDS are so many, the attacks still also increasing in different forms. This paper reviews most techniques usable in IDS, to help users and security professionals to take robust measures in identifying the strength and weakness of each technique. The result of this study shows that majority of techniques perform well at rate more than 99%.
Other Latest Articles
- Flood Analysis of Wainganga River by using HEC-RAS model
- Calculation of the cost-effectiveness of staff using the TCO
- Implementation of Human Hand Gesture Recognition System for External Control Network
- The emotional intelligence in sales
- The concept of «sustainability» is used traditionally in the financial analysis of companies'' activities and it’s calculated as a series of indicators based on financial reports
Last modified: 2017-11-13 01:50:14