Abstract
<p>In this article there has been presented new intrusion detection and prevention algorithm implemented on Raspberry Pi platform. The paper begins with the presentation of research methodology in the field of Intrusion Detection Systems. Adequate supervision and control over network traffic is crucial for the security of information and communication technology. As a result of the limited budget allocated for the IT infrastructure of small businesses and the high price of dedicated solutions, many companies do not use mentioned systems. Therefore, in this order, there has been proposed monitoring solution based on the generally available Raspberry Pi platform. The paper is addressed to network administrators.</p>
Highlights
S Abstract— In this article there has been presented new intrusion detection and prevention algorithm implemented on Raspberry Pi platform
The paper begins with the presentation of research methodology in the field of Intrusion Detection Systems
As a result of the limited budget allocated for the IT infrastructure of small businesses and the high price of dedicated solutions, many companies do not use mentioned systems
Summary
U (IDS) dates back to 1980, a crucial role in their development increases detection efficiency. The first one is directed to the detection of anomalies in the functioning of the protected system, while the other is focused on abusive behavior detection in functioning of the system Each of these methods has its advantages and disadvantages, and in practice, most of the solutions are based on both approaches. Pobrane z czasopisma Annales AI- Informatica http://ai.annales.umcs.pl Data: 08/11/2021 16:07:35 process in relation to software components It concerns the methods of detecting the threats that underlie the analyzers construction. Most of current IDS are dedicated to a particular information system, and their movement to another system may be difficult This is due to the dedication of applied solutions for specific hardware and software platforms – IDS has based its functionality on.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.