Survey paper on intrusion detection techniques
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY (Vol.6, No. 2)Publication Date: 2013-01-01
Authors : Rachna Kulhare; Divakar Singh;
Page : 329-335
Keywords : Clustering; data mining; intrusion detection system; network security.;
Abstract
Network security has been one of the most?important problems in Computer Network Management and Intrusion is the most publicized threats to security. In recent years, intrusion detection has emerged as an important field for network security. IDSs obtain better results when each class ofattacks is treated as a separate problem and handled by specialized algorithms. Now in days various model and method are available for intrusion detection. In this paper, we present a study of intrusion detection. Detection method to improve the detection rate & helping the users to develop secure information systems.
Other Latest Articles
- MULTIPLE-ACCESS TECHNOLOGY OF CHOICE IN 3GPP LTE
- Usability Evaluation Approach for VLS: A Conceptual Framework
- Secured Data Transmission Using Wavelet Based Steganography And Cryptography
- A Variable Step Size for Acoustic Echo Cancellation Using Normalized Sub band Adaptive Filter
- A Preview on Subspace Clustering of High Dimensional Data
Last modified: 2016-06-29 19:52:58