In the system and networks, abnormal behavior is detected by anomaly-based IDS (Intrusion Detection System). If the working of a computer system is different from normal working is considered as an attack. The difference of comparison relies on traffic rate, a variety of packets for every protocol etc. Malicious traffic or data on a system is detected by intrusion detection process. To detect illegal, suspicious and malicious information and data, IDS can be a part of the software or a device. First is Detection of an attack then using different method to stop, Prevent an attack and disaster is the user’s highest priority. Anomaly-based IDS satisfy their requirement and demand.
CITATION STYLE
Umasoni, Kumari, U., & Kumar, A. (2019). A Comparative Study of Anomaly Based Detection Techniques. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 26, pp. 344–349). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-03146-6_38
Mendeley helps you to discover research relevant for your work.