Abstract

The intrusion detection system usually first carries out the real-time analysis and collection through the core data information of the computer host system and network, and then makes the correct judgment and the corresponding reflection on the abuse of the resources by some legitimate users and the intrusion behaviors of the illegal users. On the basis of the traditional network security technology, the intrusion detection system has completed the response and detection, played a full defensive function, dealt with the network security incidents, realized the transition from the post-discovery to the pre-warning and the automatic response, and also provided the more effective evidence to investigate the legal responsibility of the intruders. The emergence of this technology means that the research in the field of the network security has entered a new era.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call