Comprehensive Review: Intrusion Detection System and Techniques

  • Sheenam S
  • Dhiman S
N/ACitations
Citations of this article
22Readers
Mendeley users who have this article in their library.

Abstract

Security becomes an important challenge to secure the network from cyber attacks. Up till now, threats on the network and security are significant research issues. With increasing the amount of network, there is a chance to secure the network. Number of methods is used to secure the system; our focus is on the study of intrusion detection System. Any hostile attacks on weakness of networks; computer might raise certain serious problems and exploit its Security Policies, Confidentiality, Integrity and Availability (CIA). Many techniques are used to check the system vulnerabilities and to detect the behavior of the system .i.e. anomalous behavior. Threats on the network become the significant research issue. There are number of literature surveys on IDS. This paper gives review on different techniques.

Cite

CITATION STYLE

APA

Sheenam, S., & Dhiman, S. (2016). Comprehensive Review: Intrusion Detection System and Techniques. IOSR Journal of Computer Engineering, 18(04), 20–25. https://doi.org/10.9790/0661-1804032025

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free