Computer Science – Networking and Internet Architecture
Scientific paper
2010-04-26
Journal of Telecommunications, Volume 2, Issue 1, p36-41, April 2010
Computer Science
Networking and Internet Architecture
M. Sadiq Ali Khan, "Revealing Method for the Intrusion Detection System", Journal of Telecommunications, Volume 2, Issue 1, p3
Scientific paper
The goal of an Intrusion Detection is inadequate to detect errors and unusual activity on a network or on the hosts belonging to a local network by monitoring network activity. Algorithms for building detection models are broadly classified into two categories, Misuse Detection and Anomaly Detection. The proposed approach should be taken into account, as the security system violations caused by both incompliance with the security policy and attacks on the system resulting in the need to describe models. However, it is based on unified mathematical formalism which is provided for subsequent merger of the models. The above formalism in this paper presents a state machine describing the behavior of a system subject. The set of intrusion description models is used by the evaluation module and determines the likelihood of undesired actions the system is capable of detecting. The number of attacks which are not described by models determining the completeness of detection by the IDS linked to the ability of detecting security violations.
No associations
LandOfFree
Revealing Method for the Intrusion Detection System does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Revealing Method for the Intrusion Detection System, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Revealing Method for the Intrusion Detection System will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-32880