Home / Papers / INTRUSION DETECTION BY INTRUSION DETECTION SYSTEM (IDS)

INTRUSION DETECTION BY INTRUSION DETECTION SYSTEM (IDS)

88 Citations2013
Sachin Malviya, S. Joshi
journal unavailable

The electronic data has now become the bone of communication & network uses electronic form of transfer & to protect it from the unauthorized world the intrusion detection system is needed.

Abstract

Secure communication or sharing on an unsecure network has a major problem in the area of security over the last few years. The attackers or hackers are always tries to break through the system to gain access to the resources to which they are not permitted. The illegitimate attempt to access over the unsecure network & creates a potential threat to the integrity of the system is the task performed by hackers. As the network become wider day by day & the information are circulated over the network this problem is even getting worse. This problem is given a name intrusion. As the intrusion is a process of trespassing the system or network to gain illegitimate access over the network the person who is doing intrusion is intruder which gives rise to the system which is able to detect such intrusion done by an intruder & this system is given name intrusion detection system. The process of detecting intrusion by intrusion detection system is Intrusion Detection. The electronic data has now become the bone of communication & network uses electronic form of transfer & to protect it from the unauthorized world the intrusion detection system is needed.