Download now Free registration required
Current era is of networking and communication; people are interested in keeping large data on networks, there exists an extensive growth in use of Internet in social networking, healthcare, e-commerce, bank transactions, and many other services. On the other hand, computers in the network are under attacks and vulnerable to many threats. Thus, these Internet applications need a satisfactory level of security and privacy. Intrusions in an information system are the activities that violate the security policy of the system, and Intrusion Detection is the process used to identify intrusions. Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characterization.
- Format: PDF
- Size: 176 KB