IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 1    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 1, January 2011
Importance of Intrusion Detection System (IDS)
Full Text(PDF, 3000)  PP.  
Asmaa Shaker Ashoor, Prof. Sharad Gore
Intrusion detection, IDS, anomaly & misuse, NID
Intruders computers, who are spread across the Internet have become a major threat in our world, The researchers proposed a number of techniques such as (firewall, encryption) to prevent such penetration and protect the infrastructure of computers, but with this, the intruders managed to penetrate the computers. IDS has taken much of the attention of researchers, IDS monitors the resources computer and sends reports on the activities of any anomaly or strange patterns. The aim of this paper is to explain the stages of the evolution of the idea of IDS and its importance to researchers and research centres, security, military and to examine the importance of intrusion detection systems and categories , classifications, and where can put IDS to reduce the risk to the network.
[1] Anderson, James P., “Computer Security Threat Monitoring and Surveillance”,Fort Washington, Pa., 1980.

[2] D. E. Denning, ""An intrusion-detection model."" IEEE Transactions on Software Engineering, Vol. SE-13(No. 2):222-232, Feb. 1987.

[3] Heberlein, L. etal. ""A Network Security Monitor."" Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy, May 1990, pp. 296-303.

[4] Paul Innella Tetrad, “The Evolution of Intrusion Detection Systems”, Digital Integrity,LLC on November 16, 2001.

[5] Harley Kozushko, “Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems”, on September 11, 2003.

Untitled Page