Abstract

Modern network systems have abundant trouble in security vulnerabilities like buffer overflow, bugs in Microsoft web, SQL injection, security of applications and operating systems, Sniffer Attack. Also, wireless devices mostly personal computers, sensors, personal digital assistants, and smart phones became economically doable as a result of advances in communication and manufacturing of small sensors. There are many kinds of different vulnerabilities to be exploited in such types of devices. Therefore to enhance different kind of securities, many kinds of mechanism are developed such as access control, cryptography, authentication, and many intrusion detection systems. Intrusion detection methods broadly organized into following two different types: one is anomaly detection and other one is misuse detection. Anomaly detection provides number of ways to try and verify whether the deviation is from the confirmed traditional usage patterns or not. The crucial fortune of anomaly detection lean on the expected pattern behaviors. Also, misuse detection system use different types of attacks which are known or different inadequate spots of the different systems to verify intrusions. The weakness of misuse detection system is not able to find any upcoming (unknown) intrusion until the system does not know the corresponding attack signatures.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.