Open Access
Subscription Access
Open Access
Subscription Access
Methods of Reducing False Alerts by Intrusion Detection System
Subscribe/Renew Journal
To accommodate the information security growth and hacker's improved strategies and tools, intrusion detection systems (IDSs) are required to be allocated across the network. Organizations require security systems that are flexible and adaptable in order to combat increasing threats from software vulnerabilities, virus attacks and other malicious code, in addition to internal attacks. To meet organizational objectives and requirements the intrusion detection systems must be effective. This paper gives an overview of Intrusion Detection Systems ability to detect the intrusions in computer systems after a thorough comparative theoretical study. Different security threats are made on the networks and are caused by the intruders who either misuse the assigned privileges or access the systems via internet. Paper also highlights the mechanism of data recovery from corrupted processes, which can be incorporated in any Intrusion detection system.
Keywords
Intrusions, Firewalls, Types of IDS, Misuse Detection and Anomaly Detection.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 235
PDF Views: 2