Ponte Academic Journal Feb 2017, Volume 73, Issue 2 |
STANDARDS AND ANALYSIS OF INTRUSION DETECTION BASED SYSTEM: A COMPARATIVE STUDY Author(s): V P KRISHNA ANNE ,Dr.K RAJASEKHARA RAO J. Ponte - Feb 2017 - Volume 73 - Issue 2 doi: 10.21506/j.ponte.2017.2.7 Abstract: In earlier days, the network intrusion detection techniques were mainly based on signatures, which describe the intrusive behaviour of the network and hence have become a standard for Intrusion Detection. To develop more efficient and productive approaches, several other alternate techniques have been proposed for improvising the process of Intrusion Detection. The most significant of these approaches include Statistical, Machine Learning and Data Mining methods which are aimed at providing better functionalities than those of signature-based approaches. Even though the alternative techniques were effective in providing better functionalities, majority of these techniques were left unused in real-time applications of Network Intrusion Detection. Despite of all these efforts the Signature-based Intrusion Detection approaches still remain the most dominantly used techniques for Network Intrusion Detection.
|
Download full text: Check if you have access through your login credentials or your institution |
|
Guide for Authors
This guideline has been prepared for the authors to new submissions and after their manuscripts have been accepted |
Authors Login
We welcome refrees who would be willing to act as reviewers |
Paper Tracking
You can track your submitted article from this tab |
Editorial Board
The international editorial board is headed by Dr. Maria E. Boschi |
General Policies
Papers that are published or held by the Journal may not be published elsewhere |
Peer Review Process
Papers will be sent to three peer reviewers for evaluation |