Revealing Method for the Intrusion Detection System

Computer Science – Networking and Internet Architecture

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

M. Sadiq Ali Khan, "Revealing Method for the Intrusion Detection System", Journal of Telecommunications, Volume 2, Issue 1, p3

Scientific paper

The goal of an Intrusion Detection is inadequate to detect errors and unusual activity on a network or on the hosts belonging to a local network by monitoring network activity. Algorithms for building detection models are broadly classified into two categories, Misuse Detection and Anomaly Detection. The proposed approach should be taken into account, as the security system violations caused by both incompliance with the security policy and attacks on the system resulting in the need to describe models. However, it is based on unified mathematical formalism which is provided for subsequent merger of the models. The above formalism in this paper presents a state machine describing the behavior of a system subject. The set of intrusion description models is used by the evaluation module and determines the likelihood of undesired actions the system is capable of detecting. The number of attacks which are not described by models determining the completeness of detection by the IDS linked to the ability of detecting security violations.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Revealing Method for the Intrusion Detection System does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Revealing Method for the Intrusion Detection System, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Revealing Method for the Intrusion Detection System will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-32880

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.