Towards Configured Intrusion Detection Systems
Towards Configured Intrusion Detection Systems
Article PDF

Keywords

Intrusion detection system
response systems
detection-based systems
configured IDS
security violations

How to Cite

Gagan Deep Sharma, & Vivek Kumar. (2016). Towards Configured Intrusion Detection Systems. Global Journal of Computer Science and Technology, 16(E4), 1–10. Retrieved from https://gjcst.com/index.php/gjcst/article/view/725

Abstract

This paper studies the challenges in the current intrusion detection system and comparatively analyzes the active and passive response systems The paper studies the existing IDS and their usefulness in detecting and preventing attacks in any type of network and control traffic with the performance of the system to be improved The study also evaluates the emerging avenues in Intrusion Detection System and explores the possible future avenues in intrusion detection scheme It is observed that the detection-based systems have started to gain popularity in the IT security domain The paper highlights the need to implement an appropriately configured IDS since an optimally configured IDS deters hackers thus reducing the need for investigation by security experts for security violations
Article PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2016 Authors and Global Journals Private Limited