NETWORK SECURITY AND INTRUSION DETECTION FOR THREAT DETECTION AND PREVENTION
Journal: International Journal of Mechanical Engineering and Technology(IJMET) (Vol.10, No. 2)Publication Date: 2019-02-27
Authors : Nidhi Mehra;
Page : 1839-1850
Keywords : Enterprise networks; cloud computing; deep learning techniques; machine learning algorithms; anomaly detection; firewalls; IDS; logging; monitoring; SIEM systems;
Abstract
Digital systems need to be protected from threats and attacks, and network security and intrusion detection are essential for this. In this paper, NIDS (Network Intrusion Detection Systems). Based on the findings of this study, network monitoring and detection have the potential to reduce downtime and defend against future intrusion attempts. The reasons for the attack are also investigated in depth, using a methodical and thorough approach. Most people, according to studies, lack the means to upgrade their existing home network or internet connection. Intruders can cause serious damage to a home network by stealing sensitive data, and even the most advanced firewalls and anti-virus programmes will not stop them. The purpose of this work is to develop an intrusion detection system that can improve the security of a private network. This study aims to determine the best practises for detecting unauthorised access to a home network. The detecting system will be based on Windows and employ an open-source system that is already available to the public with some modifications for domestic use.This paper provides an overview of threat detection and prevention approaches used in network security and intrusion detection. To investigate the developments in this field during that time, a thorough assessment of the literature is undertaken, of various techniques used by different research scholars. The article also goes over the system parts that go into implementing network security and intrusion detection, emphasising the functions of routers, switches, firewalls, IDS, IPS, logging and monitoring systems, SIEM systems, and incident response parts. A block diagram is also provided to show how these parts are connected to one another.. For researchers, practitioners, and organisations looking to comprehend and put into practise efficient network security and intrusion detection solutions for threat detection and prevention, this paper is an invaluable resource.
Other Latest Articles
- MACHINE TRANSLATION AND LANGUAGE GENERATION FOR MULTILINGUAL COMMUNICATION
- COREFERENCE RESOLUTION AND ENTITY DISAMBIGUATION FOR NATURAL LANGUAGE UNDERSTANDING
- SENTIMENT ANALYSIS AND OPINION MINING FOR SOCIAL MEDIA AND REVIEWS
- VIDEO SUMMARIZATION AND RETRIEVAL FOR CONTENT ANALYSIS
- EVALUATION OF VARIOUS PERFORMANCE MEASURES IN ENGINEERING SYSTEMS
Last modified: 2023-06-17 14:27:42