Open Access Open Access  Restricted Access Subscription Access

Network Intrusion Detection Using Correlation Functional Dependency


Affiliations
1 Sipna College of Engineering, Amravati, India
2 Department of Computer Science & Technology, Bengal Engineering Science University, Shibpur, Howrah - 711 103, India
 

We will learn the concept of intrusion detection system in real time. This seminar will give brief idea to have our data to be in secured system i.e free from hackers. We will elaborate the types of intrusion detection system and get into concept of real-time system to detect any intruder coming into the system. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. We have also discussed the real time intrusion detection system in brief with the efficiency related to instruion detection systems. Data processed by the IDS may be a sequence of commands executed by an user, a sequence of system calls launched by an application (for example a web client), network packets, and so on. Finally, the IDS can trigger some countermeasures to eliminate attack cause/effect whenever an intrusion is detected.

Keywords

Intrusion Detection System.
User
Notifications
Font Size

Abstract Views: 173

PDF Views: 0




  • Network Intrusion Detection Using Correlation Functional Dependency

Abstract Views: 173  |  PDF Views: 0

Authors

Nitin D. Shelokar
Sipna College of Engineering, Amravati, India
S. A. Ladhake
Department of Computer Science & Technology, Bengal Engineering Science University, Shibpur, Howrah - 711 103, India

Abstract


We will learn the concept of intrusion detection system in real time. This seminar will give brief idea to have our data to be in secured system i.e free from hackers. We will elaborate the types of intrusion detection system and get into concept of real-time system to detect any intruder coming into the system. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. We have also discussed the real time intrusion detection system in brief with the efficiency related to instruion detection systems. Data processed by the IDS may be a sequence of commands executed by an user, a sequence of system calls launched by an application (for example a web client), network packets, and so on. Finally, the IDS can trigger some countermeasures to eliminate attack cause/effect whenever an intrusion is detected.

Keywords


Intrusion Detection System.