Comprehensive Review: Intrusion Detection System and Techniques

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4

Abstract

Abstract: Security becomes an important challenge to secure the network from cyber attacks. Up till now, threats on the network and security are significant research issues. With increasing the amount of network, there is a chance to secure the network. Number of methods is used to secure the system; our focus is on thestudy of intrusion detection System. Any hostile attacks on weakness of networks; computer might raise certain serious problems and exploit its Security Policies, Confidentiality, Integrity and Availability (CIA). Many techniques are used to check the system vulnerabilities and to detect the behavior of the system .i.e. anomalous behavior. Threats on the network become the significant research issue. There are number of literature surveys on IDS. This paper gives review on different techniques.

Authors and Affiliations

Sheenam , Sanjeev Dhiman

Keywords

Related Articles

 A Novel approach for Evaluation of video tracking Under Real world conditions

 Tracking object in videos has applications in video surveillance and other main applications. The absence of a commonly adopted performance evaluation Framework is hampering advances in the design of effective vi...

Implementation of an Improved Multi-Channel Security in Cloud Computing Using Image Steganography and RSA Algorithm

The increase use of cloud computing infrastructure has led to a security consciousness by users and cloud service providers to protect data available in the cloud from illegal users. Even though, different techniques hav...

 Advanced Client Repudiation Diverge Auditor in Public Cloud

 Abstract: With data storage and sharing services provided by cloud , people work together by sharing data asa group . After creating group and shared data in the cloud user in the group is able to access and modifi...

Study of Hiding Sensitive Data in Data Mining Using Association Rules

Abstract: This paper describes Apriori algorithm for association rules for hiding sensitive data in data mining if Large data contain sensitive information that data must be protected from the unauthorized users. Here, w...

 Agriculture Ontology for Sustainable Development in Nigeria

 Nigeria, a country of more than 160 million people; also, the biggest oil exporter in Africa [1] Nigeria with her oil wealth, food security, and unemployment remains a serious problem. Shortage and increase in...

Download PDF file
  • EP ID EP133589
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

Sheenam, Sanjeev Dhiman (2016). Comprehensive Review: Intrusion Detection System and Techniques. IOSR Journals (IOSR Journal of Computer Engineering), 18(4), 20-25. https://europub.co.uk/articles/-A-133589