期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2011
卷号:2
期号:3
页码:982-986
出版社:TechScience Publications
摘要:Intrusion detection is the act of detecting unwanted traffic on a network or a device. A intrusion detection system (IDS) provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic.Network based intrusion detection are the most deployed IDS. An IDS can be a piece of installed software or a physical appliance. Many IDS tools will also store a detected event in a log to be reviewed at a later date or will combine events with other data to make decisions regarding policies or damage control. This paper discusses the various types of attacks that can be detected in a simulated network environment. The different types of attacks are Probe attacks,R2L,Dos and U2R attacks.on tech
关键词:Intrusion Detection System (IDS); Probe attacks; Dos;(Denial of Service) attacks;R2L ( Remote to Local ) attack; U2R (User;to Root) attack;HIDS;Signature and Anamoly Based;IDS.