Loading

Intrusion Detection Systems Technology
Tripti Sharma1, Khomlal Sinha2
1Tripti Sharma, Assistant Professor & Head, Department of Computer Science & Engineering, Chhatrapati Shivaji Institute of Technology (CSIT), Durg, Chhattisgarh, India.
2Khomlal Sinha, M.Tech. Scholar (Computer Science & Engineering), Chhatrapati Shivaji Institute of Technology (CSIT), Durg, Chhattisgarh, India,

Manuscript received on November 14, 2011. | Revised Manuscript received on December 22, 2011. | Manuscript published on December 30, 2011. | PP: 28-33  | Volume-1 Issue-2, December 2011. | Retrieval Number: B0127111111/2011©BEIESP

Open Access | Ethics and  Policies | Cite 
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Network security is one of the most important nonfunctional requirements in a system [1]. Over the years, many software solutions have been developed to enhance network security and this paper provides an insight into one such solution which has become prominent in the last decade i.e. Intrusion Detection System (IDS) [2]. In this paper, we have proposed an overview of intrusion detection system and their classification with advantages and disadvantages, and also providing the basic requirement of intrusion detection system.
Keywords: Host based IDS, Intrusion Detection System, misuse IDS, network security, texanomy, etc.