A Novel Approach for Intrusion Detection and Prevention System
DOI:
https://doi.org/10.32628/CSEIT1952320Keywords:
Intrusion Detection, Interruption Identification Framework, IDSs, Interruption Avoidance Framework.Abstract
Intrusion Detection and Prevention System disclosure is approach towards watching the action appearing in a pc structure and separating them for signs of probable scenes, which are infringement or moving toward perils of infringement of PC security courses of action, commendable use methodologies, or standard security practices. An interruption identification framework is customizing that robotizes the intrusion disclosure process. An interruption avoidance framework is modifying that has all of the capacities of an intrusion distinguishing proof structure and can in like manner try to stop possible scenes. IDS and IPS progressions offer an expansive number of comparable capacities, and administrators can ordinarily impede neutralizing activity incorporates into IPS things, making them fill in as IDSs. As necessities are, for brevity the term interruption recognition and anticipation frameworks are used all through whatever is left of this segment to insinuate the two IDS and IPS advancements. Any exclusion is expressly acclaimed.
References
- K. Scarfone, P. Mell, Special Publication 800-94: Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology (NIST) (2007).
- U. A. Sandhu, S. Haider, S. Naseer, O. U. Ateeb, “A Survey of Intrusion Detection & Prevention Techniques”, International Conference on Information Communication and Management IPCSIT: IACSIT Press, Singapore 2011.
- K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), Recommendations of the National Institute of Standards and Technology: NIST Special Publication, February 2007.
- B. Menezes, Network Security and Cryptography: CENGAGE Learning, Chapter 14, 18, 19, 21, 22, 24, 2010.
- J. R. Vacca, Computer and information security handbook: Morgan Kaufmann Series in Computer Security, First edition, May 4, 2009.
- A. Fuchsberger, “Intrusion Detection Systems and Intrusion Prevention Systems”, Published in Elsevier: Information Security Technical Report 10, pp. 134-139, 2005.
- P. Innella, http://www.symantec.com /connect/articles/ managing-intrusion-detection-systems-large-organizationspart-one.
- EC-Council, Ethical Hacking and Countermeasures Version 6 Module XVII Web Application Vulnerabilities: International Council of E-commerce Consultants.
- R. E. Overill, “ISMS insider intrusion prevention and detection”, Published in Elsevier, Information security technical report 13, pp. 216-219, 2008.
- N. Godbole, Information systems security: Security Management, Metrics, Frameworks and Best Practices: JOHN WIELY, All Chapters, 2009.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.