Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Methods of Reducing False Alerts by Intrusion Detection System


Affiliations
1 Pune University, India
     

   Subscribe/Renew Journal


To accommodate the information security growth and hacker's improved strategies and tools, intrusion detection systems (IDSs) are required to be allocated across the network. Organizations require security systems that are flexible and adaptable in order to combat increasing threats from software vulnerabilities, virus attacks and other malicious code, in addition to internal attacks. To meet organizational objectives and requirements the intrusion detection systems must be effective. This paper gives an overview of Intrusion Detection Systems ability to detect the intrusions in computer systems after a thorough comparative theoretical study. Different security threats are made on the networks and are caused by the intruders who either misuse the assigned privileges or access the systems via internet. Paper also highlights the mechanism of data recovery from corrupted processes, which can be incorporated in any Intrusion detection system.

Keywords

Intrusions, Firewalls, Types of IDS, Misuse Detection and Anomaly Detection.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 234

PDF Views: 2




  • Methods of Reducing False Alerts by Intrusion Detection System

Abstract Views: 234  |  PDF Views: 2

Authors

Prajakta Sandeep Jadhav
Pune University, India

Abstract


To accommodate the information security growth and hacker's improved strategies and tools, intrusion detection systems (IDSs) are required to be allocated across the network. Organizations require security systems that are flexible and adaptable in order to combat increasing threats from software vulnerabilities, virus attacks and other malicious code, in addition to internal attacks. To meet organizational objectives and requirements the intrusion detection systems must be effective. This paper gives an overview of Intrusion Detection Systems ability to detect the intrusions in computer systems after a thorough comparative theoretical study. Different security threats are made on the networks and are caused by the intruders who either misuse the assigned privileges or access the systems via internet. Paper also highlights the mechanism of data recovery from corrupted processes, which can be incorporated in any Intrusion detection system.

Keywords


Intrusions, Firewalls, Types of IDS, Misuse Detection and Anomaly Detection.