Abstract
Intrusion Detection Systems (IDS) is used as a tool to
detect intrusions on IT networks, providing support in network
monitoring to identify and avoid possible attacks. Most such
approaches adopt Signature-based methods for detecting attacks
which include matching the input event to predefined database
signatures. Signature based intrusion detection acts as an adaptable
device security safeguard technology. This paper discusses various
Signature-based Intrusion Detection Systems and their advantages;
given a set of signatures and basic patterns that estimate the relative
importance of each intrusion detection system feature, system
administrators may help identify cyber-attacks and threats to the
network and Computer system. Eighty percent of incidents can be
easily and promptly detected using signature-based detection
methods if used as a precautionary phase for vulnerability detection
and twenty percent rest by anomaly-based intrusion detection system
that involves comparing definitions of normal activity or event
behavior with observed events in identifying the significant
deviations and deciding the traffic to flag.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Management of Technology and Innovation,General Engineering
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献