ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 2)

Publication Date:

Authors : ; ; ;

Page : 108-111

Keywords : Network Security; wireless communication; MANET;

Source : Downloadexternal Find it from : Google Scholarexternal


The NIDS is a term which specify about the introduction of the malicious attacks whi ch takes place in the networks. This paper focuses on the types of the attacks which are made on the networks and the prevention technique which will help the network to avoid an intrusion in the network. The paper focuses on the terms that how the confidentiality, integrity, and assurance w ould be provided in the network. NIDS perform analysis of all traf fic passing on a network fragment or subnet. Perform packet sniffing and analyze network traffic to identify and stop bads activity. They are typically deployed inline. Like a network firewall . They recei ve packets, analyze them, decision whether the y should be permitted, and enable acceptable packets to pass through. Network - based products might be able to detect an d stop some unknown warning throug h application protocol analysis. However, network - based products are g enerally not capable of closing malicious or vicious mobile code or Trojan horses . An IDS is a network security technology used originally built for detecting vulnerability exploits a target application or computer. The IDS is a lso listen only device. It can monitor the traffic traveling to or from different device on that network. There are mainly two type’s approaches. First approach name is signature based system and the second approach is anomaly based system.

Last modified: 2016-04-20 23:19:53