A survey on intrusion detection techniques and real time traffic analysis mechanism

2015 
Security has become the greatest problem within and outside the organizations. User ID, passwords and firewalls are the common steps that organizations take to secure their computers. However, these are not so effective mediums in current context of unsecure eon. Intruders and attackers are so advanced that they access the computer and manipulate it, so they cannot be traced easily. Through this contribution objective is to find out & present existing intrusion detection system (IDS) with their pros and cons that will be helpful to select the best one and provide the secure environment so that system will be protected from instrusion and attacks.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []