Need for an Intrusion Detection System: A Systematic Review
Roohi Sharma is with Department of Information Technology, Model Institute of Engineering and Technology (Affiliated to Jammu University, Jammu), Kandoli Nagrota Jammu-181221, India.
Manuscript received on March 11, 2013. | Revised Manuscript Received on March 12, 2013. | Manuscript published on March 25, 2013. | PP: 36-40 | Volume-1, Issue-6, April 2013. | Retrieval Number: F0243041613/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The continuous increase within network size and its complexity, securing computer systems from attacks becomes important and a challenge. Because of dramatically increase in number of attacks, intrusion detection on internet becomes important and heated research field in computer science. The goal of intrusion detection is to identify or try to detects intrusion attempts like unauthorized use, misuse, abuse of computer systems by either internal or external penetrators, so that action may be taken to repair the damage later. This paper provides the review of existing techniques in intrusion detection to detect attacks.
Keywords: Attacks, intrusion detection system, intrusion prevention system, network security, worms.