International Journal of Computer Applications
Making a network foolproof is a very important task that every Intrusion Detection System should provide to the network. Areas of deployment of IDS are also an important task that helps in efficient functioning of the system. Deploying the IDS in all the systems is a very inefficient strategy that reduces the performance of the entire network, while deploying the IDS in inappropriate or inefficient nodes leads to the system becoming vulnerable to attacks. The current proposal deals with improving the effectiveness of an Intrusion Detection System (IDS) by selecting the appropriate candidates in the network.