Host Based Intrusion Detection System

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

In today’s technology, new attacks are emerging day by day which makes the systems insecure even the system wrapped with number of security measures. Intrusion Detection System (IDS) is used to detect the intrusion. Intrusion Detection System (IDS) is crucial requirement to safeguard the organization electronic assets. Intrusion detection is a process analyze the traffic on a device or network to determine whether the traffic is malicious or not. In other words, intrusion is any unauthorized attempt to access private data of which the intruder doesn’t have access rights. It can be a software or physical entity that monitors the traffic which violates organization security policies and standard security practices. An Intrusion Detection System is made to mainly avoid the intruder from being successful in accessing the prohibited files. It continuously analyzes the traffic to detect the intrusion and respond in timely manner as a result of which risks of intrusions are diminished. It not only stops the intruder from getting access but also captures an image of the changes that he makes in the files. An added feature of capturing a webcam image of the intruder at the time of intrusion can also be collected.

Authors and Affiliations

Keywords

Related Articles

An Introduction to 3D User Interface for Operating System

There has been considerable advancements, growth and development in the 3D displays/screens/monitors or 3D capable displays/screens/monitors. This emergence has caused a rise to many 3D - movies, games and virtual enviro...

Acute Marjolin

Marjolin

A Clinical Study on Dental Fluorosis with Light- Induced Fluorescence

The up-to-date dental caries treatments and preventive strategies are related to severel fluoride sources. On the other hand fluoride is present in some nutritional products too. The aim of the present study is to invest...

Microbial Production and Maximization of α- Amylase by Submerged Fermentation

Microbial Production and Maximization of α- Amylase by Submerged Fermentation

Efficient Detection for DOS Attacks by Multivariate Correlation Analysis

The interconnected systems are under the threads from the network attack. Denial of service attack is the most common thread. DoS attack attempt to prevent a computer or service from being available. In the proposed sys...

Download PDF file
  • EP ID EP363853
  • DOI -
  • Views 95
  • Downloads 0

How To Cite

(2015). Host Based Intrusion Detection System. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-363853