Diverse and Conglomerate Modi-Operandi for Anomaly Intrusion Detection Systems
Of late, research works on Intrusion Detection System have been receiving a lot of attention. An IDS detects hazard patterns of network traffic on the residual open parts through observing user activities. There are several models available as of now, but the major loop hole in most of the existing models is the incapability of cognizing new attacks i.e., novel threats to a system. Anomaly based intrusion detection system has undoubtedly resulted in easing the pain of detecting novel threats for a system when compared to its counterpart, Signature based Intrusion Detection System.