An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security Issues
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Technical solutions, introduced by policies and implantations are essential requirements of an information security program. Advanced technologies such as intrusion detection and prevention system (IDPS) and analysis tools have become prominent in the network environment while they involve with organizations to enhance the security of their information assets. Scanning and analyzing tools to pinpoint vulnerabilities, holes in security components, unsecured aspects of the network and deploying of IDPS technology are highlighted.
Authors and Affiliations
Ahmad Sharif
Performance Analysis of Different Clustering Algorithm
Abstract: Clustering is the process of grouping objects into clusters such that the objects from the sameclusters are similar and objects from different clusters are dissimilar. The relationship is often expressed...
Modification and Climate Change Analysis of surrounding Environment using Remote Sensing and Geographical Information System
Abstract: This review is presented in three parts. The first part explains such terms as climate, climate change, climate change adaptation, remote sensing (RS) and geographical information systems (GIS). The second part...
Semi-Supervised Discriminant Analysis Based On Data Structure
Abstract: Dimensionality reduction is a key data-analytic technique for mining high-dimensional data. In thispaper, we consider a general problem of learning from pairwise constraints in the form of must-link and cannotl...
Prevention and Detection of Wormhole Attack in Mobile Adhoc Network Using Clustering and RTT
Abstract: A security constraint in mobile adhoc network is very critical task. Some critical security issue such as black hole attack, wormhole attack, sinkhole attack, prevention and detection of attack is major challen...
Pervasive Computing Applications And Its Security Issues &Challenges
Abstract: This paper discusses the emerging field of pervasive computing applications and its securitychallenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,anywhere...