Front End and Back End Database Protection From Intruders in Distributed Web Application

Download Now
Provided by: International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Topic: Security
Format: PDF
Study of the intrusion detection system. Current network system has large scale trouble from the security vulnerability due to simple routing protocol, security less application, bugs in network & operating system. Therefore need of network intrusion detection system arrives. Generally there are two type of intrusion detection technique. First is misuse of computer resource detection & anomaly detection. In misuse detection pattern there is some information available regarding well-known attack, which is used to identify the attack by comparing it with every incoming request. But this technique not in use full future or unrecognized attack. Which is not store or available in database of IDS.
Download Now

Find By Topic