Abstract

This document presents network attacks, intrusion detection systems, intrusion prevention systems, and intrusion detection methods, including signature-based detection and anomaly-based detection. Intrusion detection/prevention (ID/PS) system methods are compared. Some data mining and machine learning methods and their applications in intrusion detection are presented. Big data is introduced into intrusion detection systems, big data analysis for large volumes of data, heterogeneous resources, and real-time stream processing. It also discusses the challenges of intrusion detection systems and the challenges posed by processing huge streams of data in the systems.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call