A STUDY ON INTRUSION DETECTION
Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.10, No. 2)Publication Date: 2019-03-16
Authors : SYEDA GAUHAR FATIMA SYEDA KAUSAR FATIMA SYED ABDUL SATTAR; SYED ADIL;
Page : 143-154
Keywords : Intrusion detection; IDS attacks; Functionality; Life cycle; Tools; Techniques;
Abstract
Intrusion Detection System (IDS) is meant to be a software application which monitors the network or system activities and finds if any malicious operations take place. Tremendous growth and practice of internet raises concerns about how to protect and communicate the digital data in a safe manner. Nowadays, hackers use different types of attacks for getting the valuable information. Many intrusion detection techniques, methods and algorithms assist to identify these attacks. This main objective of this paper is to provide a complete study about the description of intrusion detection, history, life cycle, types of intrusion detection methods, types of attacks, different tools and techniques, research needs, tasks and applications.
Other Latest Articles
- Typology of cocoa-based agroforestry systems in a forest-savannah transition zone: case study of Kokumbo (Centre, Côte d’Ivoire)
- SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
- Genetic diversity and population structure of cavy (Cavia porcellus L) in three agro ecological zones of Côte d'Ivoire
- LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHOD
- Effects of corm size and plant density on Saffron (Crocus sativus L.) yield and its components
Last modified: 2019-05-07 20:26:22