Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kairi, Animesh
- Study on Intrusion Detection System
Abstract Views :169 |
PDF Views:4
Authors
Affiliations
1 IT Department, IEM Salt Lake, IN
1 IT Department, IEM Salt Lake, IN
Source
Networking and Communication Engineering, Vol 9, No 4 (2017), Pagination: 86-90Abstract
Today malware is so much and diverse that security professionals have known for some time that signature based solutions would no longer be able to cut it alone. Not only are there too many new malware files each day, some of them are able to change their shape and signature as they go along. But, if you can’t recognize something by its looks, you might be able to categorize it by its behavior. It is deployed in a network for assuring an intrusion free computing environment. In this paper, we shall discuss the two technologies in details, their functionality, their performances and their effectiveness to stop the malicious activity over a computer network