Open Access   Article Go Back

A Fundamental Analysis of Intrusion Detection and Intrusion Prevention System in Network

G. Kavitha1

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-02 , Page no. 90-94, Jan-2019

Online published on Jan 31, 2019

Copyright © G. Kavitha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Kavitha, “A Fundamental Analysis of Intrusion Detection and Intrusion Prevention System in Network,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.90-94, 2019.

MLA Style Citation: G. Kavitha "A Fundamental Analysis of Intrusion Detection and Intrusion Prevention System in Network." International Journal of Computer Sciences and Engineering 07.02 (2019): 90-94.

APA Style Citation: G. Kavitha, (2019). A Fundamental Analysis of Intrusion Detection and Intrusion Prevention System in Network. International Journal of Computer Sciences and Engineering, 07(02), 90-94.

BibTex Style Citation:
@article{Kavitha_2019,
author = {G. Kavitha},
title = {A Fundamental Analysis of Intrusion Detection and Intrusion Prevention System in Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {02},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {90-94},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=653},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=653
TI - A Fundamental Analysis of Intrusion Detection and Intrusion Prevention System in Network
T2 - International Journal of Computer Sciences and Engineering
AU - G. Kavitha
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 90-94
IS - 02
VL - 07
SN - 2347-2693
ER -

           

Abstract

The spread of data networks in networks and associations have prompted an every day immense volume of data trade between various networks which, obviously, has brought about new threats to the national associations. It very well may be said that data security has turned out to be today a standout amongst the most difficult zones. At the end of the day, deformities and impediments of computer network security address unsalvageable harm for undertakings. Along these lines, ID of security threats and methods for managing them is fundamental. Yet, the inquiry brought up in such manner is that what are the systems and approaches to manage security threats that must be taken to guarantee the security of computer networks? In this unique situation, the present investigation plans to complete an audit of the writing by utilizing prior looks into and library approach, to give security solutions despite threats to their computer networks. The aftereffects of this examination can prompt additionally comprehension of security threats and approaches to manage them and help to execute a safe data stage.

Key-Words / Index Term

Network Security, Threats, Privacy

References

[1] U. A. Sandhu, S. Haider, S. Naseer and O. U. Ateeb, A Survey of Intrusion Detection & Prevention Techniques, International Conference on Information Communication and Management IPCSIT: IACSIT Press, Singapore 2011.
[2] K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), Recommendations of the National Institute of Standards and Technology: NIST Special Publication, 2007.
[3] B. Menezes, Network Security and Cryptography (Patparganj, New Delhi: Cengage Learning India Pvt. Ltd, 2010).
[4] J. R. Vacca, Computer and information security handbook (New York: Morgan Kaufmann, Elsevier 2009) 39-66, 133-166, 255- 267, 293-306, 349-393, 469-496.
[5] A. Fuchsberger, Intrusion Detection Systems and Intrusion Prevention Systems, Published by Elsevier: Information Security Technical Report 10, 2005, 134-139.
[6] P. Innella, http://www.symantec.com /connect/articles/ managing-intrusion-detection-systems-large-organizationspart-one.
[7] EC-Council, Ethical Hacking and Countermeasures Version 6 Module XVII Web Application Vulnerabilities: International Council of E-commerce Consultants, 2008.
[8] R. E. Overill, ISMS insider intrusion prevention and detection, Published in Elsevier, Information security technical report 13, 2008, 216-219.
[9] N. Godbole, Information Systems Security: Security Management, Metrics, Frameworks and Best Practices (New Delhi: WIELY INDIA, 2009).
[10] N. F. Mir, Computer and Communication Networks (New York: Prentice Hall, 2006), 57-60, 101-125.
[11] B. Forouzan, Data Communications and Networking (New York: McGraw Hill, 2006), 3-23, 395-464.
[12] A. S. Ashoor and S. Gore, Importance of Intrusion Detection system (IDS), International Journal of Scientific and Engineering Research, 2(1), 2011, 1-4.