Abstract
This paper presents the methodologies of IDS technologies. Essentially, any system requiring security must be protected from attacks. Intrusion detection systems are used to detect unusual activity in a network of computer systems to identify if activity is unfriendly or unauthorized in order to enable a response to that violation. To achieve this, there are two main types of IDS: network-based and host-based. This paper outlines these two types of IDS respectively and highlights the advantages of each kind. © 2013 Trade Science Inc. - INDIA.
Author supplied keywords
Cite
CITATION STYLE
Yonghui, C. (2013). Study of intrusion detection systems. BioTechnology: An Indian Journal, 8(10), 1353–1356. https://doi.org/10.22214/ijraset.2021.34935
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.