期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2016
卷号:4
期号:2
页码:1390
DOI:10.15680/IJIRCCE.2016.0402092
出版社:S&S Publications
摘要:Data exchange is very essential part in any communication process. Since, from establishing to delivery at desired destiny. The overall process has to be sure about integrity of information being shared across channel for flawless transmission. In computer communication both sender and receiver are expected to sign legal agreement before gettin g into actual tr ansmission. T hroughout the data exchange process they need to abide by this. Agreement generally may include the traffic pattern, data rate, packet format, sequence signature, mode of transmission, preamble and CRC details. Based on this, the two communic ating entities authenticate each other. On observing disruption in any of above details indicates presence of the intrusion (unauthenticated third party). Since, from many decades many researches are working towards better identification of intrusion and m any are successful. Through this paper I tried to summarize some of recent works focused on intrusion detection with variousapproaches
关键词:Types of IDS; Medoid Clustering Algorithm;Snort and EAACK