Intrusion Detection Technique in Standard Network

Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discu...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of electronics, communication and soft computing science and engineering communication and soft computing science and engineering, 2012-01, Vol.2 (3), p.15-15
Hauptverfasser: Patil, Mamitha R, Raj, Shivu G, Jain, Siddharth, Rajshekhar, M
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 15
container_issue 3
container_start_page 15
container_title International journal of electronics, communication and soft computing science and engineering
container_volume 2
creator Patil, Mamitha R
Raj, Shivu G
Jain, Siddharth
Rajshekhar, M
description Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discussed are designed, to detect instances of the access of computer systems by unauthorized individuals and the misuse of system resources by unauthorized system users. A review of the foundations of intrusion detection systems and the methodologies, which are the focus of current development efforts are discussed. The results of an IDS in network security and network professionals are discussed, to offer a real-world view of Intrusion Detection System in Networks.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1448734020</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1448734020</sourcerecordid><originalsourceid>FETCH-LOGICAL-p610-3cbc1e0f60351b2afc1209063d237f627e260405ec16c501ca090798cbdcd60a3</originalsourceid><addsrcrecordid>eNpdjk1LxDAURYMgOIzzHwpu3BRe8tKkXcr4NTCMC7sf0tdX7FiTsUnx7xvRlat74R4u50KslLK2bLS1V2IT4wkAJBqpsV4JufNpXuIYfHHPiSn9tJbpzY-fCxejL16T872b--LA6SvM79ficnBT5M1frkX7-NBun8v9y9Nue7cvz0ZCidSRZBgMYCU75QaSChow2Cu0g1GWlQENFZM0VIEkl1fb1NT11BtwuBa3v7fnOWSTmI4fYySeJuc5LPEota4talCQ0Zt_6Ckss89ymUKFoLSu8BuO4kxd</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1432302445</pqid></control><display><type>article</type><title>Intrusion Detection Technique in Standard Network</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Patil, Mamitha R ; Raj, Shivu G ; Jain, Siddharth ; Rajshekhar, M</creator><creatorcontrib>Patil, Mamitha R ; Raj, Shivu G ; Jain, Siddharth ; Rajshekhar, M</creatorcontrib><description>Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discussed are designed, to detect instances of the access of computer systems by unauthorized individuals and the misuse of system resources by unauthorized system users. A review of the foundations of intrusion detection systems and the methodologies, which are the focus of current development efforts are discussed. The results of an IDS in network security and network professionals are discussed, to offer a real-world view of Intrusion Detection System in Networks.</description><identifier>EISSN: 2277-9477</identifier><language>eng</language><publisher>Amravati: International Journal of Electronics, Communication and Soft Computing Science and Engineering</publisher><subject>Computer information security ; Electronics ; Foundations ; Intrusion ; Networks ; Soft computing ; Unauthorized</subject><ispartof>International journal of electronics, communication and soft computing science and engineering, 2012-01, Vol.2 (3), p.15-15</ispartof><rights>Copyright International Journal of Electronics, Communication and Soft Computing Science and Engineering 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Patil, Mamitha R</creatorcontrib><creatorcontrib>Raj, Shivu G</creatorcontrib><creatorcontrib>Jain, Siddharth</creatorcontrib><creatorcontrib>Rajshekhar, M</creatorcontrib><title>Intrusion Detection Technique in Standard Network</title><title>International journal of electronics, communication and soft computing science and engineering</title><description>Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discussed are designed, to detect instances of the access of computer systems by unauthorized individuals and the misuse of system resources by unauthorized system users. A review of the foundations of intrusion detection systems and the methodologies, which are the focus of current development efforts are discussed. The results of an IDS in network security and network professionals are discussed, to offer a real-world view of Intrusion Detection System in Networks.</description><subject>Computer information security</subject><subject>Electronics</subject><subject>Foundations</subject><subject>Intrusion</subject><subject>Networks</subject><subject>Soft computing</subject><subject>Unauthorized</subject><issn>2277-9477</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpdjk1LxDAURYMgOIzzHwpu3BRe8tKkXcr4NTCMC7sf0tdX7FiTsUnx7xvRlat74R4u50KslLK2bLS1V2IT4wkAJBqpsV4JufNpXuIYfHHPiSn9tJbpzY-fCxejL16T872b--LA6SvM79ficnBT5M1frkX7-NBun8v9y9Nue7cvz0ZCidSRZBgMYCU75QaSChow2Cu0g1GWlQENFZM0VIEkl1fb1NT11BtwuBa3v7fnOWSTmI4fYySeJuc5LPEota4talCQ0Zt_6Ckss89ymUKFoLSu8BuO4kxd</recordid><startdate>20120101</startdate><enddate>20120101</enddate><creator>Patil, Mamitha R</creator><creator>Raj, Shivu G</creator><creator>Jain, Siddharth</creator><creator>Rajshekhar, M</creator><general>International Journal of Electronics, Communication and Soft Computing Science and Engineering</general><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20120101</creationdate><title>Intrusion Detection Technique in Standard Network</title><author>Patil, Mamitha R ; Raj, Shivu G ; Jain, Siddharth ; Rajshekhar, M</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p610-3cbc1e0f60351b2afc1209063d237f627e260405ec16c501ca090798cbdcd60a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Computer information security</topic><topic>Electronics</topic><topic>Foundations</topic><topic>Intrusion</topic><topic>Networks</topic><topic>Soft computing</topic><topic>Unauthorized</topic><toplevel>online_resources</toplevel><creatorcontrib>Patil, Mamitha R</creatorcontrib><creatorcontrib>Raj, Shivu G</creatorcontrib><creatorcontrib>Jain, Siddharth</creatorcontrib><creatorcontrib>Rajshekhar, M</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of electronics, communication and soft computing science and engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Patil, Mamitha R</au><au>Raj, Shivu G</au><au>Jain, Siddharth</au><au>Rajshekhar, M</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Intrusion Detection Technique in Standard Network</atitle><jtitle>International journal of electronics, communication and soft computing science and engineering</jtitle><date>2012-01-01</date><risdate>2012</risdate><volume>2</volume><issue>3</issue><spage>15</spage><epage>15</epage><pages>15-15</pages><eissn>2277-9477</eissn><abstract>Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and computer networks. The technologies which are discussed are designed, to detect instances of the access of computer systems by unauthorized individuals and the misuse of system resources by unauthorized system users. A review of the foundations of intrusion detection systems and the methodologies, which are the focus of current development efforts are discussed. The results of an IDS in network security and network professionals are discussed, to offer a real-world view of Intrusion Detection System in Networks.</abstract><cop>Amravati</cop><pub>International Journal of Electronics, Communication and Soft Computing Science and Engineering</pub><tpages>1</tpages></addata></record>
fulltext fulltext
identifier EISSN: 2277-9477
ispartof International journal of electronics, communication and soft computing science and engineering, 2012-01, Vol.2 (3), p.15-15
issn 2277-9477
language eng
recordid cdi_proquest_miscellaneous_1448734020
source EZB-FREE-00999 freely available EZB journals
subjects Computer information security
Electronics
Foundations
Intrusion
Networks
Soft computing
Unauthorized
title Intrusion Detection Technique in Standard Network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T17%3A24%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Intrusion%20Detection%20Technique%20in%20Standard%20Network&rft.jtitle=International%20journal%20of%20electronics,%20communication%20and%20soft%20computing%20science%20and%20engineering&rft.au=Patil,%20Mamitha%20R&rft.date=2012-01-01&rft.volume=2&rft.issue=3&rft.spage=15&rft.epage=15&rft.pages=15-15&rft.eissn=2277-9477&rft_id=info:doi/&rft_dat=%3Cproquest%3E1448734020%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1432302445&rft_id=info:pmid/&rfr_iscdi=true