A Comparative Study of Anomaly Based Detection Techniques

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the system and networks, abnormal behavior is detected by anomaly-based IDS (Intrusion Detection System). If the working of a computer system is different from normal working is considered as an attack. The difference of comparison relies on traffic rate, a variety of packets for every protocol etc. Malicious traffic or data on a system is detected by intrusion detection process. To detect illegal, suspicious and malicious information and data, IDS can be a part of the software or a device. First is Detection of an attack then using different method to stop, Prevent an attack and disaster is the user’s highest priority. Anomaly-based IDS satisfy their requirement and demand.

Cite

CITATION STYLE

APA

Umasoni, Kumari, U., & Kumar, A. (2019). A Comparative Study of Anomaly Based Detection Techniques. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 26, pp. 344–349). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-03146-6_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free