logo
Ponte Academic Journal
Feb 2017, Volume 73, Issue 2

STANDARDS AND ANALYSIS OF INTRUSION DETECTION BASED SYSTEM: A COMPARATIVE STUDY

Author(s): V P KRISHNA ANNE ,Dr.K RAJASEKHARA RAO

J. Ponte - Feb 2017 - Volume 73 - Issue 2
doi: 10.21506/j.ponte.2017.2.7



Abstract:
In earlier days, the network intrusion detection techniques were mainly based on signatures, which describe the intrusive behaviour of the network and hence have become a standard for Intrusion Detection. To develop more efficient and productive approaches, several other alternate techniques have been proposed for improvising the process of Intrusion Detection. The most significant of these approaches include Statistical, Machine Learning and Data Mining methods which are aimed at providing better functionalities than those of signature-based approaches. Even though the alternative techniques were effective in providing better functionalities, majority of these techniques were left unused in real-time applications of Network Intrusion Detection. Despite of all these efforts the Signature-based Intrusion Detection approaches still remain the most dominantly used techniques for Network Intrusion Detection.
Download full text:
Check if you have access through your login credentials or your institution