All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Abstract

Study of intrusion detection systems

Author(s): Cao Yonghui

This paper presents the methodologies of IDS technologies. Essentially, any system requiring security must be protected from attacks. Intrusiondetection systems are used to detect unusual activity in a network of computer systems to identify if activity is unfriendly or unauthorized in order to enable a response to that violation. To achieve this, there are two main types of IDS: network-based and host-based. This paper outlines these two types of IDS respectively and highlights the advantages of each kind.


Share this       
Awards Nomination

Table of Contents

Google Scholar citation report
Citations : 875

BioTechnology: An Indian Journal received 875 citations as per Google Scholar report

Indexed In

  • CASS
  • Google Scholar
  • Open J Gate
  • China National Knowledge Infrastructure (CNKI)
  • CiteFactor
  • Cosmos IF
  • Directory of Research Journal Indexing (DRJI)
  • Secret Search Engine Labs
  • Euro Pub
  • ICMJE

View More

Flyer