Open Access
Subscription Access
Open Access
Subscription Access
Study on Intrusion Detection System
Subscribe/Renew Journal
Today malware is so much and diverse that security professionals have known for some time that signature based solutions would no longer be able to cut it alone. Not only are there too many new malware files each day, some of them are able to change their shape and signature as they go along. But, if you can’t recognize something by its looks, you might be able to categorize it by its behavior. It is deployed in a network for assuring an intrusion free computing environment. In this paper, we shall discuss the two technologies in details, their functionality, their performances and their effectiveness to stop the malicious activity over a computer network
Keywords
IDS, IPS, Intrusion, Intrusion Detection, Intrusion Prevention, Firewall.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 245
PDF Views: 4