Mobility

Comparision of Approaches to Implement Intrusion Detection System

Download Now Free registration required

Executive Summary

An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. Intrusion detection system alerts the system administrators when potential hostile traffic is detected. Commercial NIDS have many differences, but Information Systems departments must face the commonalities that they share such as significant system footprint, complex deployment and high monetary cost. In this paper, the authors compare the various approaches to implement an intrusion detection system such as data mining, decision trees, data clustering, naive bayes, artificial neural network and genetic algorithm.

  • Format: PDF
  • Size: 159.1 KB