ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.10, No. 2)

Publication Date:

Authors : ; ;

Page : 143-154

Keywords : Intrusion detection; IDS attacks; Functionality; Life cycle; Tools; Techniques;

Source : Downloadexternal Find it from : Google Scholarexternal


Intrusion Detection System (IDS) is meant to be a software application which monitors the network or system activities and finds if any malicious operations take place. Tremendous growth and practice of internet raises concerns about how to protect and communicate the digital data in a safe manner. Nowadays, hackers use different types of attacks for getting the valuable information. Many intrusion detection techniques, methods and algorithms assist to identify these attacks. This main objective of this paper is to provide a complete study about the description of intrusion detection, history, life cycle, types of intrusion detection methods, types of attacks, different tools and techniques, research needs, tasks and applications.

Last modified: 2019-05-07 20:26:22