Abstract

In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks but unknown Security attacks have learned to survive in a high secure precinct, it must be noticed that virus has an augmenting influence, so it is very difficult to detect unknown attacks at application layer on the run time. This paper presents some of the best well known Intrusion detection techniques and appropriate protocols which were proposed for intrusion detection and anomaly detection in the recent years under various parameters.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call