Skip navigation


Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2143
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKalavadekar, Mr. rakash N-
dc.contributor.authorSane, Shirish S-
dc.date.accessioned2019-07-15T05:07:09Z-
dc.date.available2019-07-15T05:07:09Z-
dc.date.issued2016-04-01-
dc.identifier.urihttp://192.168.3.232:8080/jspui/handle/123456789/2143-
dc.description.abstract- Conventional intrusion prevention methods such as firewalls, access management schemes or cryptography techniques, have not proved themselves to completely defend networks and systems from refined malwares and attacks. The Intrusion Detection Systems (IDS) proved to be the right salvage to the current issues and became an important element of any security infrastructure to sight these threats before they induce widespread harm. The basic aim of IDS is to detect attacks and their nature that may harm the computer system. Several different approaches for intrusion detection have been reported in the literature. These approaches are broadly categorized into three approaches: i) Signature-based approach ii) anomaly based approach and iii) hybrid approach that combines signature and anomaly detection approaches. Hybrid approach has been found to be superior that either signature based or anomaly based approaches. However, despite superior performance, the hybrid approach has till date failed to provide desired detection rate and time needed for detection.en_US
dc.subjectIntrusion Detectionen_US
dc.subjectSecurityen_US
dc.subjectSignatureen_US
dc.subjectAnomalyen_US
dc.subjectData Miningen_US
dc.titleEFFECTIVE INTRUSION DETECTION SYSTEMS USING HYBRID APPROACHen_US
dc.typeOtheren_US
Appears in Collections:EFFECTIVE INTRUSION DETECTION SYSTEMS USING HYBRID APPROACH

Files in This Item:
File Description SizeFormat 
05987fdf7cd010f4d73d3f3383fc298e4907.pdf401.26 kBUnknownView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.