Network security is one of the most important non-functional requirements in a system. Over the years, many software solutions have been developed to enhance network security. Intrusion Detection System (IDS) we have provided an overview of different types of intrusion Detection Systems, the advantages and disadvantages of the same. The need for IDS in a system environment and the generic blocks in IDS is also mentioned.The examples are as follows: (1) Misuse intrusion detection system that uses state transition analysis approach, (2) Anomaly based system that uses payload modeling and (3) Hybrid model that combines the best practices of Misuse and Anomaly based intrusion systems.
CITATION STYLE
Kumra, A., Jeberson, W., & Jeberson, K. (2017). Intrusion Detection System Based on Data Mining Techniques. Oriental Journal of Computer Science and Technology, 10(2), 491–496. https://doi.org/10.13005/ojcst/10.02.33
Mendeley helps you to discover research relevant for your work.