Classification and Analysis of Techniques Applied in Intrusion Detection Systems
2017
Currently, the development of most of organizations depends on technology for mining information, storing and its transactions. But these frequent use online technologies make the data to be exposed to the risk of attacks that compromise the normal activities of systems. To protect and prevent these attacks, the researchers had implemented the intrusion detection systems (IDS). Even the IDS are so many, the attacks still also increasing in different forms. This paper reviews most techniques usable in IDS, to help users and security professionals to take robust measures in identifying the strength and weakness of each technique. The result of this study shows that majority of techniques perform well at rate more than 99%.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
0
References
2
Citations
NaN
KQI