Network Intrusion Detection and Prevention

  • Shankar A
  • Shankar A
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

The basic principle of intrusion detection is based on the assumption that intrusive activities are noticeably different from normal ones and thus are detectable 16. Many intrusion detection approaches have been suggested in the literature since Andersons seminal report 5. Traditionally these approaches are classified into three categories: misuse detection, anomaly detection and specification-based detection. Anomaly based intrusion detection approaches are dedicated to establishing a model of the data flow that is monitored under normal conditions without the presence of any intrusive procedures. In contrast, misuse detection approaches aim to encode knowledge about patterns in the data flow that are known to correspond to intrusive procedures in form of specific signatures. In specification based detection approaches, security experts predefine the allowed system behaviors and thus events that do not match the specifications are labeled as attacks. In this chapter we discuss these different approaches in detail and summarize some representative examples in each category.

Cite

CITATION STYLE

APA

Shankar, A., & Shankar, A. (2021). Network Intrusion Detection and Prevention. International Journal of Applied Engineering Research, 16(4), 267. https://doi.org/10.37622/ijaar/16.4.2021.267-270

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free