Open Access Open Access  Restricted Access Subscription or Fee Access

Study on Intrusion Detection System

Animesh Kairi

Abstract


Today malware is so much and diverse that security professionals have known for some time that signature based solutions would no longer be able to cut it alone. Not only are there too many new malware files each day, some of them are able to change their shape and signature as they go along. But, if you can’t recognize something by its looks, you might be able to categorize it by its behavior. It is deployed in a network for assuring an intrusion free computing environment. In this paper, we shall discuss the two technologies in details, their functionality, their performances and their effectiveness to stop the malicious activity over a computer network


Keywords


IDS, IPS, Intrusion, Intrusion Detection, Intrusion Prevention, Firewall

Full Text:

PDF

References


Jennifer Jabbusch , “IDS vs. IPS: How to know when you need the technology”, 22 November 2010

Analysis of Optimization Techniques in Wireless Sensor Networks

A Kairi, R Guhathakurata, A DuttaWireless Communication 8 (2), 82-85

https://supportforums.cisco.com/community/netpro/security/intrusion-prevention.

http://www.cisco.com/c/en/us/products/security/ngips/index.html

http://www.windowsecurity.com/articles/intrusion-detection-systems-faq.html

A Study of Packet Control Techniques for Wireless Network A Kairi, S Chakraborty AMERICAN JOURNAL OF ADVANCED COMPUTING 3 (NO 1 (2016)), 38-45

B a c e, R. An Introduction to Intrusion Detection and Assessment: For System and Network Security Management, ICSA White Paper, 1998.

MoadAlhamaty , Ali Yazdian and Fathi Al-qadasi “Intrusion Detection System Based On The Integrity of TCP Packet” published in World Academy of Science, Engineering and Technology 11 2005.

http://www.hcpro.com/HIM-24598-866/Tip-Consider-the-pros-and-cons-of-intrusion-detection-systems.html

http://www.bzaugg.com/2010/06/an-overview-of-intrusion-detection-systems-technology-and-research/

https://sites.google.com/site/idpsinfo498/home/common-detection-methodologies

https://www.sans.org/reading-room/whitepapers/wireless/wireless-intrusion-detection-systems-1543

http://searchsecurity.techtarget.com/definition/network-behavior-anomaly-detection

http://en.wikipedia.org/wiki/Intrusion_detection_system

Sriram Sundar Rajan, Vijaya Krishna Cherukuri-“An Overview of Intrusion Detection Systems”.

John McHugh, Alan Christie, and Julia Allen- “The Role of Intrusion Detection Systems”- Software Engineering Institute, CERT Coordination Center.

Shankar Sharan Tripathi, Sonu Agrawal- “A Survey on Enhanced Intrusion Detection System in Mobile Ad hoc Network”-International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 1, Issue 7, September 2012.

Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande – “Intrusion Detection System for Cloud Computing”. International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012 ISSN 2277-8616 67 IJSTR©2012

Paul Dokas, Levent Ertoz, Vipin Kumar, Aleksandar Lazarevic, Jaideep Srivastava, Pang-Ning Tan- “Data Mining for Network Intrusion Detection”.

“Top 125 Network Security Tools”- SecTools.Org- http://sectools.org/tag/ids/sec


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.