Intrusion Detection For Known And Unknown Security A

Abstract

 Internet has enabled us to connect to any computer, at any time from any geographical location. But at the same time there is possibility of security attacks. However, security attacks even be on our own local area network (LAN) or wireless LAN. As networks were actually created to share information among users and other services, some network administrators never strove for higher secur In fact in some cases, network security was compromised for easiness in sharing files or for remote access/control like enabling file sharing, SNMP (Simple Network Management Protocol) etc. Due to Internet large number of users are vulnerable to network attacks, as they are not familiar with different types of network attacks. Since firewalls and other self-protective security measures are not sufficient, you need supplementary tools to detect and respond to security breaches as they take place

Authors and Affiliations

Dr. Md. Yusuf Mulge

Keywords

Related Articles

 EFFECTIVENESS OF PCA IN CLASSIFICATION PROBLEMS

 This paper is designed to make the study of effectiveness of PCA (Principal Component Analysis) method effectiveness in classification specially for the classification of face and computer virus. This technique is...

 Fabrication and Analysis of Bicycle Washing Machine

 In many developing countries it is not possible to machine wash clothes due to the absence or scarcity of electric power or the absence of machine itself. Washing clothes by hand leaves one breathless and takes an...

 STRUCTURAL DESIGN FOR ECCENTRIC LOADING OF FOOTING

 Eccentric loading, in which vertical or inclined wall surrounds one or more sides of the soil mass beneath the footing, is one of the recognized bearing capacity improvement techniques. The footing when provided w...

 Cloud Storage Security And Providing Integrity Proof

 Cloud computing has been envisioned as the next-generation architecture and solution to the rising storage costs of IT Enterprises. Cloud faithfully stores the data and return back to the owner whenever needed. Bu...

 Performance and Emission Characteristics of a Four Stoke Diesel Engine Operated by Neem Biodiesel Blended with Diesel

 Industrialization and motorization of the world has led to a steep rise in the demand for petroleum products and other side the fast depletion of fossil fuel reserves and issues like global warming have led the re...

Download PDF file
  • EP ID EP90246
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

Dr. Md. Yusuf Mulge (30).  Intrusion Detection For Known And Unknown Security A. International Journal of Engineering Sciences & Research Technology, 1(10), 586-591. https://europub.co.uk/articles/-A-90246