NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 2, Issue 3
Abstract
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.
Authors and Affiliations
Harpreet kaur
A Word & Character N-Gram based Arabic OCR Error Simulation model
This paper provides a new model aimed to enhanceArabic OCR degraded text retrieval effectiveness. The proposed model based onsimulating the Arabic OCR recognition mistakesbased on both, word based and Character N-Gram ap...
Given a raga recording, can we scientifically verify which school of Vadi-Samvadi selection is supported by the artist?
The notes which play the most important and second most important roles in expressing a raga are called Vadi and Samvadi swars respectively in (North) Indian Classical music. Like Bageshree, Bhairavi, Shankara, Hamir and...
HYDROMAGNETIC STABILITY OF STREAMING COMPRESSIBLE CYLINDER PERVADED BY MAGNETIC FIELD
The Stability of MHD compressible streaming fluid cylinder of radius endowed with surface tension and pervaded by axial magnetic field has been developed. The stability criterion is established in general form. The model...
Skin Color detection Using Stepwise Neural Network and Color Mapping Co-occurrence Matrix
Skin color has been proven to be a useful and robust cue for face detection, human tracking, image content filtering, pornographic filtering, etc. Most of skin classification researches are focused on using pixel-based...
Twig Pattern Minimization Based on XML Schema Constraints
Twig pattern is one of the core components of XQuery. Twig usually includes redundancy nodes which can be optimized. Schema feature is used to judge whether the node of Twig pattern is redundancy. In this paper, we propo...