Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Study on Intrusion Detection System


Affiliations
1 IT Department, IEM Salt Lake, India
     

   Subscribe/Renew Journal


Today malware is so much and diverse that security professionals have known for some time that signature based solutions would no longer be able to cut it alone. Not only are there too many new malware files each day, some of them are able to change their shape and signature as they go along. But, if you can’t recognize something by its looks, you might be able to categorize it by its behavior. It is deployed in a network for assuring an intrusion free computing environment. In this paper, we shall discuss the two technologies in details, their functionality, their performances and their effectiveness to stop the malicious activity over a computer network


Keywords

IDS, IPS, Intrusion, Intrusion Detection, Intrusion Prevention, Firewall.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 245

PDF Views: 4




  • Study on Intrusion Detection System

Abstract Views: 245  |  PDF Views: 4

Authors

Animesh Kairi
IT Department, IEM Salt Lake, India

Abstract


Today malware is so much and diverse that security professionals have known for some time that signature based solutions would no longer be able to cut it alone. Not only are there too many new malware files each day, some of them are able to change their shape and signature as they go along. But, if you can’t recognize something by its looks, you might be able to categorize it by its behavior. It is deployed in a network for assuring an intrusion free computing environment. In this paper, we shall discuss the two technologies in details, their functionality, their performances and their effectiveness to stop the malicious activity over a computer network


Keywords


IDS, IPS, Intrusion, Intrusion Detection, Intrusion Prevention, Firewall.