The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Organization’s crucial data are highly endangered due to several security attacks and threats. Intrusion is one among such type of threat. Intrusions are efforts that attempt to elude normal security mechanisms of computer system. Intrusion detection is the process of monitoring and analyzing the events arising in a computer network to identify security breaches. Intrusion Detection System is the most important tool in maintaining network’s security. This paper provides an overview of Intrusion Detection System and helps reader gain some fundamental concepts and methodologies used by IDS. This paper also provides discussion about types of IDS, approaches and types of attacks in the network and intensive literature survey. Finally, comparison of several IDS methods with merits and demerits are also presented in the paper.

Keywords

Attacks, DoS, IDS, Intrusion, Misuse Detection, Network Security
User