Study on Intrusion Detection System
Abstract
Today malware is so much and diverse that security professionals have known for some time that signature based solutions would no longer be able to cut it alone. Not only are there too many new malware files each day, some of them are able to change their shape and signature as they go along. But, if you can’t recognize something by its looks, you might be able to categorize it by its behavior. It is deployed in a network for assuring an intrusion free computing environment. In this paper, we shall discuss the two technologies in details, their functionality, their performances and their effectiveness to stop the malicious activity over a computer network
Keywords
Full Text:
PDFReferences
Jennifer Jabbusch , “IDS vs. IPS: How to know when you need the technology”, 22 November 2010
Analysis of Optimization Techniques in Wireless Sensor Networks
A Kairi, R Guhathakurata, A DuttaWireless Communication 8 (2), 82-85
https://supportforums.cisco.com/community/netpro/security/intrusion-prevention.
http://www.cisco.com/c/en/us/products/security/ngips/index.html
http://www.windowsecurity.com/articles/intrusion-detection-systems-faq.html
A Study of Packet Control Techniques for Wireless Network A Kairi, S Chakraborty AMERICAN JOURNAL OF ADVANCED COMPUTING 3 (NO 1 (2016)), 38-45
B a c e, R. An Introduction to Intrusion Detection and Assessment: For System and Network Security Management, ICSA White Paper, 1998.
MoadAlhamaty , Ali Yazdian and Fathi Al-qadasi “Intrusion Detection System Based On The Integrity of TCP Packet” published in World Academy of Science, Engineering and Technology 11 2005.
http://www.hcpro.com/HIM-24598-866/Tip-Consider-the-pros-and-cons-of-intrusion-detection-systems.html
http://www.bzaugg.com/2010/06/an-overview-of-intrusion-detection-systems-technology-and-research/
https://sites.google.com/site/idpsinfo498/home/common-detection-methodologies
https://www.sans.org/reading-room/whitepapers/wireless/wireless-intrusion-detection-systems-1543
http://searchsecurity.techtarget.com/definition/network-behavior-anomaly-detection
http://en.wikipedia.org/wiki/Intrusion_detection_system
Sriram Sundar Rajan, Vijaya Krishna Cherukuri-“An Overview of Intrusion Detection Systems”.
John McHugh, Alan Christie, and Julia Allen- “The Role of Intrusion Detection Systems”- Software Engineering Institute, CERT Coordination Center.
Shankar Sharan Tripathi, Sonu Agrawal- “A Survey on Enhanced Intrusion Detection System in Mobile Ad hoc Network”-International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 1, Issue 7, September 2012.
Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande – “Intrusion Detection System for Cloud Computing”. International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012 ISSN 2277-8616 67 IJSTR©2012
Paul Dokas, Levent Ertoz, Vipin Kumar, Aleksandar Lazarevic, Jaideep Srivastava, Pang-Ning Tan- “Data Mining for Network Intrusion Detection”.
“Top 125 Network Security Tools”- SecTools.Org- http://sectools.org/tag/ids/sec
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.