Comparative study of intrusion detection system and its Recovery mechanism

2010 
Organizations require flexible and adaptable intrusion detection systems to combat increasing internal and external threats. To meet organizational objectives and requirements the intrusion detection systems must be effective. This paper analyzes Intrusion Detection Systems ability to detect the intrusions in computer systems after a thorough comparative theoretical study. Different security threats are made on the networks and are caused by the intruders who either misuse the assigned privileges or access the systems via internet. Conclusive analysis of this paper indicates that security can be best achieved by using anomaly detection mechanism in Host Based IDS with Centralized Strategy. Proposed analysis is based on necessary security objectives required by different organizations and the variety of security threats which we encounter in our every daily life. Paper also highlights the mechanism of data recovery from corrupted processes, which can be incorporated in any Intrusion detection system.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    12
    References
    2
    Citations
    NaN
    KQI
    []