Abstract

Network security has been one of the most important problems in Computer Network Management and Intrusion is the most publicized threats to security. In recent years, intrusion detection has emerged as an important field for network security. IDSs obtain better results when each class ofattacks is treated as a separate problem and handled by specialized algorithms. Now in days various model and method are available for intrusion detection. In this paper, we present a study of intrusion detection. Detection method to improve the detection rate & helping the users to develop secure information systems.

Highlights

  • Intrusion detection systems (IDSs) are monitoring devices that have been added to the wall of security in order to prevent malicious activity on a system

  • This work focuses on network intrusion detection systems (NIDSs) mainly because they can detect the widest range of attacks compared to other types of IDSs

  • An intrusion detection system is an indispensable tool for network administrators because without such a device, it would be impossible to analyze the huge amount of packets traversing current networks every second

Read more

Summary

INTRODUCTION

Intrusion detection systems (IDSs) are monitoring devices that have been added to the wall of security in order to prevent malicious activity on a system. Intrusion detection systems are monitoring devices which are used to detect intrusions on a computer or a network. The goals of the IDS provide the requirements for the IDS Policy. False positive (FP): Or false alarm, Corresponds to the number of detected attacks but it is normal. False negative (FN): Corresponds to the number of detected normal instances but it is attack, in other words these attacks are the target of intrusion detection systems. True positive (TP): Corresponds to the number of detected attacks and it is attack. True negative (TN): Corresponds to the number of detected normal instances and it is normal

TYPES OF INTRUSION DETECTION SYSTEMS
SURVEY OF INTRUSION DETECTION SYSTEM USING DIFFERENT APPROACHES
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call