首页    期刊浏览 2024年12月01日 星期日
登录注册

文章基本信息

  • 标题:Detection of Attacks in an Intrusion Detection System
  • 本地全文:下载
  • 作者:Sapna S. Kaushik ; P.R.Deshmukh
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2011
  • 卷号:2
  • 期号:3
  • 页码:982-986
  • 出版社:TechScience Publications
  • 摘要:Intrusion detection is the act of detecting unwanted traffic on a network or a device. A intrusion detection system (IDS) provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic.Network based intrusion detection are the most deployed IDS. An IDS can be a piece of installed software or a physical appliance. Many IDS tools will also store a detected event in a log to be reviewed at a later date or will combine events with other data to make decisions regarding policies or damage control. This paper discusses the various types of attacks that can be detected in a simulated network environment. The different types of attacks are Probe attacks,R2L,Dos and U2R attacks.on tech
  • 关键词:Intrusion Detection System (IDS); Probe attacks; Dos;(Denial of Service) attacks;R2L ( Remote to Local ) attack; U2R (User;to Root) attack;HIDS;Signature and Anamoly Based;IDS.
国家哲学社会科学文献中心版权所有