ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Classification and Analysis of Techniques Applied in Intrusion Detection Systems

Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.6, No. 7)

Publication Date:

Authors : ;

Page : 216-219

Keywords : Data mining; IDS; normalization;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Currently, the development of most of organizations depends on technology for mining information, storing and its transactions. But these frequent use online technologies make the data to be exposed to the risk of attacks that compromise the normal activities of systems. To protect and prevent these attacks, the researchers had implemented the intrusion detection systems (IDS). Even the IDS are so many, the attacks still also increasing in different forms. This paper reviews most techniques usable in IDS, to help users and security professionals to take robust measures in identifying the strength and weakness of each technique. The result of this study shows that majority of techniques perform well at rate more than 99%.

Last modified: 2017-11-13 01:50:14