Download now Free registration required
An Intrusion Detection System (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system IDS. Since IDS only works by matching the incoming transaction record with its predefined attack patterns stored in the database, it is necessary to develop a system which can automatically detect any new attack and record it in the database. Hence, the authors propose the Anomaly Detection System (ADS) as an enhancement in mending IDS loopholes by using a technique called signature-based generation which analyzes normal profile against anomaly profile and automatically build its signature to be later on stored in the database.
- Format: PDF
- Size: 234.5 KB