Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/2143
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kalavadekar, Mr. rakash N | - |
dc.contributor.author | Sane, Shirish S | - |
dc.date.accessioned | 2019-07-15T05:07:09Z | - |
dc.date.available | 2019-07-15T05:07:09Z | - |
dc.date.issued | 2016-04-01 | - |
dc.identifier.uri | http://192.168.3.232:8080/jspui/handle/123456789/2143 | - |
dc.description.abstract | - Conventional intrusion prevention methods such as firewalls, access management schemes or cryptography techniques, have not proved themselves to completely defend networks and systems from refined malwares and attacks. The Intrusion Detection Systems (IDS) proved to be the right salvage to the current issues and became an important element of any security infrastructure to sight these threats before they induce widespread harm. The basic aim of IDS is to detect attacks and their nature that may harm the computer system. Several different approaches for intrusion detection have been reported in the literature. These approaches are broadly categorized into three approaches: i) Signature-based approach ii) anomaly based approach and iii) hybrid approach that combines signature and anomaly detection approaches. Hybrid approach has been found to be superior that either signature based or anomaly based approaches. However, despite superior performance, the hybrid approach has till date failed to provide desired detection rate and time needed for detection. | en_US |
dc.subject | Intrusion Detection | en_US |
dc.subject | Security | en_US |
dc.subject | Signature | en_US |
dc.subject | Anomaly | en_US |
dc.subject | Data Mining | en_US |
dc.title | EFFECTIVE INTRUSION DETECTION SYSTEMS USING HYBRID APPROACH | en_US |
dc.type | Other | en_US |
Appears in Collections: | EFFECTIVE INTRUSION DETECTION SYSTEMS USING HYBRID APPROACH |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
05987fdf7cd010f4d73d3f3383fc298e4907.pdf | 401.26 kB | Unknown | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.