Abstract

This document presents network attacks, intrusion detection systems, intrusion prevention systems, and intrusion detection methods, including signature-based detection and anomaly-based detection. Intrusion detection/prevention (ID/PS) system methods are compared. Some data mining and machine learning methods and their applications in intrusion detection are presented. Big data is introduced into intrusion detection systems, big data analysis for large volumes of data, heterogeneous resources, and real-time stream processing. It also discusses the challenges of intrusion detection systems and the challenges posed by processing huge streams of data in the systems.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.