期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2011
卷号:2
期号:4Ver1
出版社:Ayushmaan Technologies
摘要:During the past five years, security of computer network has become main stream in most of everyone’s lives. Today, most discussions on computer security is centered on the tools or techniques used in protecting and defending networks. Intrusion detection is the method of identifying unauthorized use, misuse, and abuse of computer systems by both system insiders and external attackers. Our aim is to discuss the feasibility of monitoring the traffic of different networks, to analyze it for providing better security. For this reason, we focus on all the components of intrusion sniffing and response system like host and network based IDS. Intrusion detection is the process used to identify intrusions; these techniques have been traditionally classified into two types: HIDS and NIDS. In this paper we discuss main functionalities of IDS, characteristics of IDS and discussing few detection techniques they are anomalybased detection, signature based, target monitoring, Stealth Probes.
关键词:IDS; Host-based; Network based anomaly; Signature; Attack;Active IDS; Passive IDS.n.l