Intrusion detection systems and techniques: a review Online publication date: Sun, 11-Sep-2016
by Bhoopesh Singh Bhati; Chandra Shekhar Rai
International Journal of Critical Computer-Based Systems (IJCCBS), Vol. 6, No. 3, 2016
Abstract: In the modern age of technology, we can transmit data from one place to another in very small amounts of time. Network, in computer science is the telecommunication network that provides ways to pass data from one computer to another. This type of technology has become one of the most important aspects of different work areas. With the advancement of the network technology, networks have become vulnerable to different types of attacks. A lot of work has been done to detect these attacks, but they are unable to detect novel attacks. In this paper, we are presenting a brief survey on different types of intrusion detection systems (IDS). A number of efficient techniques have been proposed by many leading researchers in this field. This survey has been done to take a comprehensive view of the various IDS and techniques.
Online publication date: Sun, 11-Sep-2016
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Critical Computer-Based Systems (IJCCBS):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com