Palekar et al., 2017 - Google Patents
Complete Study Of Intrusion Detection SystemPalekar et al., 2017
View PDF- Document ID
- 15415779654468731750
- Author
- Palekar M
- Dhande S
- Publication year
- Publication venue
- International Journal of Innovative Research and Advanced Studies (IJIRAS)
External Links
Snippet
Intrusion detection is one of the popular techniques for preventing information in the systems.. Intrusion Detection System (IDS) is a software application which look over the network or system activities. It detects harmful activities that occur huge growth and usage of …
- 238000001514 detection method 0 title abstract description 52
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8931099B2 (en) | System, method and program for identifying and preventing malicious intrusions | |
US8640234B2 (en) | Method and apparatus for predictive and actual intrusion detection on a network | |
US6405318B1 (en) | Intrusion detection system | |
Thuraisingham et al. | Data mining for security applications | |
Sandhu et al. | A survey of intrusion detection & prevention techniques | |
KR20220081145A (en) | AI-based mysterious symptom intrusion detection and system | |
Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
Adeleke | Intrusion detection: issues, problems and solutions | |
Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
Bhattacharjee et al. | Fuzzy Approach for Intrusion Detection System: A Survey. | |
GB2625390A (en) | Methods and systems for indicating the possibility of a cyber-attack on a computer network | |
Navin et al. | A survey on intrusion detection system | |
Sai-Halasz | Directions in future high end processors | |
Kishore et al. | Intrusion detection system a need | |
Palekar et al. | Complete Study Of Intrusion Detection System | |
Khan et al. | Novice threat model using SIEM system for threat assessment | |
Sandhu et al. | A study of the novel approaches used in intrusion detection and prevention systems | |
Singh et al. | A review on intrusion detection system | |
Xiao | Research on computer network information security based on big data technology | |
Rizvi et al. | A review on intrusion detection system | |
CN114844667B (en) | Intelligent security analysis management decision system and method based on network equipment | |
KR102671718B1 (en) | Weblog new threat detection security system that predicts new intrusions through machine learning | |
Karthikeyan et al. | NETWORK INTRUSION DETECTION SYSTEM BASED ON PACKET FILTERS. | |
Khanday et al. | Intrusion Detection Systems for Trending Cyberattacks | |
Gauhar Fatima et al. | A Study on Intrusion Detection |