ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Detail Analysis of Attacks and Methods of Intrusion Detection System

Journal: International Journal of Trend in Scientific Research and Development (Vol.8, No. 4)

Publication Date:

Authors : ;

Page : 1032-1041

Keywords : Invasion; Intrusion Detection; KDDCup99; Misuse detection; Anomaly detection;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Computer networks link many activities, events, and applications. The network's performance must be improved and have more capacity to handle increased users. The network's computer system should guarantee security, confidentiality, and integrity. An intrusion jeopardizes the operation and security of a wired or wireless network system. If the invasions are not detected at the appropriate level, the loss to the system might be immeasurable. Intrusions occur when malicious actors harm information resources. The hackers tamper the normal operations or attempt to infiltrate the system via the gateway. The study analyzes the attack and normal traffic packets from the KDD Cup99 dataset. The KDD Cup99 data includes benchmark traffic and intrusion detection features. However, most intrusion detection systems today have significant false alarm rates and miss many attacks because they cannot distinguish between unlawful and unlawful behaviors. Keshav Sinha | Partha Paul "Detail Analysis of Attacks and Methods of Intrusion Detection System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-4 , August 2024, URL: https://www.ijtsrd.com/papers/ijtsrd68276.pdf Paper Url: https://www.ijtsrd.com/computer-science/other/68276/detail-analysis-of-attacks-and-methods-of-intrusion-detection-system/keshav-sinha

Last modified: 2024-09-27 19:55:20