[go: up one dir, main page]

Palekar et al., 2017 - Google Patents

Complete Study Of Intrusion Detection System

Palekar et al., 2017

View PDF
Document ID
15415779654468731750
Author
Palekar M
Dhande S
Publication year
Publication venue
International Journal of Innovative Research and Advanced Studies (IJIRAS)

External Links

Snippet

Intrusion detection is one of the popular techniques for preventing information in the systems.. Intrusion Detection System (IDS) is a software application which look over the network or system activities. It detects harmful activities that occur huge growth and usage of …
Continue reading at www.ijiras.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
US8931099B2 (en) System, method and program for identifying and preventing malicious intrusions
US8640234B2 (en) Method and apparatus for predictive and actual intrusion detection on a network
US6405318B1 (en) Intrusion detection system
Thuraisingham et al. Data mining for security applications
Sandhu et al. A survey of intrusion detection & prevention techniques
KR20220081145A (en) AI-based mysterious symptom intrusion detection and system
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
Adeleke Intrusion detection: issues, problems and solutions
Beigh et al. Intrusion detection and prevention system: issues and challenges
Bhattacharjee et al. Fuzzy Approach for Intrusion Detection System: A Survey.
GB2625390A (en) Methods and systems for indicating the possibility of a cyber-attack on a computer network
Navin et al. A survey on intrusion detection system
Sai-Halasz Directions in future high end processors
Kishore et al. Intrusion detection system a need
Palekar et al. Complete Study Of Intrusion Detection System
Khan et al. Novice threat model using SIEM system for threat assessment
Sandhu et al. A study of the novel approaches used in intrusion detection and prevention systems
Singh et al. A review on intrusion detection system
Xiao Research on computer network information security based on big data technology
Rizvi et al. A review on intrusion detection system
CN114844667B (en) Intelligent security analysis management decision system and method based on network equipment
KR102671718B1 (en) Weblog new threat detection security system that predicts new intrusions through machine learning
Karthikeyan et al. NETWORK INTRUSION DETECTION SYSTEM BASED ON PACKET FILTERS.
Khanday et al. Intrusion Detection Systems for Trending Cyberattacks
Gauhar Fatima et al. A Study on Intrusion Detection