Intrusion Detection Technique in Standard Network
Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discu...
Gespeichert in:
Veröffentlicht in: | International journal of electronics, communication and soft computing science and engineering communication and soft computing science and engineering, 2012-01, Vol.2 (3), p.15-15 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 15 |
---|---|
container_issue | 3 |
container_start_page | 15 |
container_title | International journal of electronics, communication and soft computing science and engineering |
container_volume | 2 |
creator | Patil, Mamitha R Raj, Shivu G Jain, Siddharth Rajshekhar, M |
description | Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discussed are designed, to detect instances of the access of computer systems by unauthorized individuals and the misuse of system resources by unauthorized system users. A review of the foundations of intrusion detection systems and the methodologies, which are the focus of current development efforts are discussed. The results of an IDS in network security and network professionals are discussed, to offer a real-world view of Intrusion Detection System in Networks. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1448734020</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1448734020</sourcerecordid><originalsourceid>FETCH-LOGICAL-p610-3cbc1e0f60351b2afc1209063d237f627e260405ec16c501ca090798cbdcd60a3</originalsourceid><addsrcrecordid>eNpdjk1LxDAURYMgOIzzHwpu3BRe8tKkXcr4NTCMC7sf0tdX7FiTsUnx7xvRlat74R4u50KslLK2bLS1V2IT4wkAJBqpsV4JufNpXuIYfHHPiSn9tJbpzY-fCxejL16T872b--LA6SvM79ficnBT5M1frkX7-NBun8v9y9Nue7cvz0ZCidSRZBgMYCU75QaSChow2Cu0g1GWlQENFZM0VIEkl1fb1NT11BtwuBa3v7fnOWSTmI4fYySeJuc5LPEota4talCQ0Zt_6Ckss89ymUKFoLSu8BuO4kxd</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1432302445</pqid></control><display><type>article</type><title>Intrusion Detection Technique in Standard Network</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Patil, Mamitha R ; Raj, Shivu G ; Jain, Siddharth ; Rajshekhar, M</creator><creatorcontrib>Patil, Mamitha R ; Raj, Shivu G ; Jain, Siddharth ; Rajshekhar, M</creatorcontrib><description>Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discussed are designed, to detect instances of the access of computer systems by unauthorized individuals and the misuse of system resources by unauthorized system users. A review of the foundations of intrusion detection systems and the methodologies, which are the focus of current development efforts are discussed. The results of an IDS in network security and network professionals are discussed, to offer a real-world view of Intrusion Detection System in Networks.</description><identifier>EISSN: 2277-9477</identifier><language>eng</language><publisher>Amravati: International Journal of Electronics, Communication and Soft Computing Science and Engineering</publisher><subject>Computer information security ; Electronics ; Foundations ; Intrusion ; Networks ; Soft computing ; Unauthorized</subject><ispartof>International journal of electronics, communication and soft computing science and engineering, 2012-01, Vol.2 (3), p.15-15</ispartof><rights>Copyright International Journal of Electronics, Communication and Soft Computing Science and Engineering 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Patil, Mamitha R</creatorcontrib><creatorcontrib>Raj, Shivu G</creatorcontrib><creatorcontrib>Jain, Siddharth</creatorcontrib><creatorcontrib>Rajshekhar, M</creatorcontrib><title>Intrusion Detection Technique in Standard Network</title><title>International journal of electronics, communication and soft computing science and engineering</title><description>Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discussed are designed, to detect instances of the access of computer systems by unauthorized individuals and the misuse of system resources by unauthorized system users. A review of the foundations of intrusion detection systems and the methodologies, which are the focus of current development efforts are discussed. The results of an IDS in network security and network professionals are discussed, to offer a real-world view of Intrusion Detection System in Networks.</description><subject>Computer information security</subject><subject>Electronics</subject><subject>Foundations</subject><subject>Intrusion</subject><subject>Networks</subject><subject>Soft computing</subject><subject>Unauthorized</subject><issn>2277-9477</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpdjk1LxDAURYMgOIzzHwpu3BRe8tKkXcr4NTCMC7sf0tdX7FiTsUnx7xvRlat74R4u50KslLK2bLS1V2IT4wkAJBqpsV4JufNpXuIYfHHPiSn9tJbpzY-fCxejL16T872b--LA6SvM79ficnBT5M1frkX7-NBun8v9y9Nue7cvz0ZCidSRZBgMYCU75QaSChow2Cu0g1GWlQENFZM0VIEkl1fb1NT11BtwuBa3v7fnOWSTmI4fYySeJuc5LPEota4talCQ0Zt_6Ckss89ymUKFoLSu8BuO4kxd</recordid><startdate>20120101</startdate><enddate>20120101</enddate><creator>Patil, Mamitha R</creator><creator>Raj, Shivu G</creator><creator>Jain, Siddharth</creator><creator>Rajshekhar, M</creator><general>International Journal of Electronics, Communication and Soft Computing Science and Engineering</general><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20120101</creationdate><title>Intrusion Detection Technique in Standard Network</title><author>Patil, Mamitha R ; Raj, Shivu G ; Jain, Siddharth ; Rajshekhar, M</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p610-3cbc1e0f60351b2afc1209063d237f627e260405ec16c501ca090798cbdcd60a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Computer information security</topic><topic>Electronics</topic><topic>Foundations</topic><topic>Intrusion</topic><topic>Networks</topic><topic>Soft computing</topic><topic>Unauthorized</topic><toplevel>online_resources</toplevel><creatorcontrib>Patil, Mamitha R</creatorcontrib><creatorcontrib>Raj, Shivu G</creatorcontrib><creatorcontrib>Jain, Siddharth</creatorcontrib><creatorcontrib>Rajshekhar, M</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of electronics, communication and soft computing science and engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Patil, Mamitha R</au><au>Raj, Shivu G</au><au>Jain, Siddharth</au><au>Rajshekhar, M</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Intrusion Detection Technique in Standard Network</atitle><jtitle>International journal of electronics, communication and soft computing science and engineering</jtitle><date>2012-01-01</date><risdate>2012</risdate><volume>2</volume><issue>3</issue><spage>15</spage><epage>15</epage><pages>15-15</pages><eissn>2277-9477</eissn><abstract>Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discussed are designed, to detect instances of the access of computer systems by unauthorized individuals and the misuse of system resources by unauthorized system users. A review of the foundations of intrusion detection systems and the methodologies, which are the focus of current development efforts are discussed. The results of an IDS in network security and network professionals are discussed, to offer a real-world view of Intrusion Detection System in Networks.</abstract><cop>Amravati</cop><pub>International Journal of Electronics, Communication and Soft Computing Science and Engineering</pub><tpages>1</tpages></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2277-9477 |
ispartof | International journal of electronics, communication and soft computing science and engineering, 2012-01, Vol.2 (3), p.15-15 |
issn | 2277-9477 |
language | eng |
recordid | cdi_proquest_miscellaneous_1448734020 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Computer information security Electronics Foundations Intrusion Networks Soft computing Unauthorized |
title | Intrusion Detection Technique in Standard Network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T17%3A24%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Intrusion%20Detection%20Technique%20in%20Standard%20Network&rft.jtitle=International%20journal%20of%20electronics,%20communication%20and%20soft%20computing%20science%20and%20engineering&rft.au=Patil,%20Mamitha%20R&rft.date=2012-01-01&rft.volume=2&rft.issue=3&rft.spage=15&rft.epage=15&rft.pages=15-15&rft.eissn=2277-9477&rft_id=info:doi/&rft_dat=%3Cproquest%3E1448734020%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1432302445&rft_id=info:pmid/&rfr_iscdi=true |