Introduction To Intrusion Detection System Review
Journal: International Journal of Scientific & Technology Research (Vol.4, No. 5)Publication Date: 2015-05-15
Authors : Rajni Tewatia; Asha Mishra;
Page : 219-223
Keywords : Index Terms Intrusion Detection system IDS; Attack; Data; False alarm; Intruder; Network; Approach.;
Abstract
Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.
Other Latest Articles
- Prioritize Improvement Opportunities Identified In Self-Assessment Using Multi-Criteria Fuzzy Group Decision
- Some Finite Sample Properties Of Seemingly Unrelated Unrestricted Regression Model A New Approach
- Critical Sucess Factor For Implementation Of Enterprise Resource Planning System ERP Survey Bumn Companies In Bandung
- The State Of IT Governance In Zimbabwe Polytechnics Case Of A Polytechnic In Zimbabwe
- Performance Assessment Of Local Biomass Powered Cereal Drier Used By Small-Scale Kenyan Farmers
Last modified: 2015-06-28 04:10:46