Object Oriented Approach to Anatomy of Intrusion Detection System

Provided by: Reed Elsevier
Topic: Security
Format: PDF
"Now-a-days intrusions become more increased in individual systems, so activities in a system must be observed by scanning and it must be saved for future use. If any discrepancy is found from observed behavior then a report must be generated to help red teams. The central idea of the authors' system lies in that it works as a supplement to already existing Intrusion Detection Systems (IDS). This is achieved by constantly monitoring the files and folders of system and system32 folders."

Find By Topic