Loading

A Research Paper on Hybrid Intrusion Detection System
Amit Kumar1, Harish Chandra Maurya2, Rahul Misra3
1Amit Kumar, M. Tech  Bhagwant University, Ajmer, India.
2Harish Chandra Maurya,  Asst. Professor, Bhagwant University, Ajmer, India.
3Rahul Misra, M. Tech Bhagwant University, Ajmer, India.
Manuscript received on March 22, 2013. | Revised Manuscript received on April 12, 2013. | Manuscript published on April 30, 2013. | PP: 294-297 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1428042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDP Ses for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDP Ses have become a necessary addition to the security infrastructure of nearly every organization. Different methods can be used to detect intrusions which make a number of assumptions that are specific only to the particular method. Hence, in addition to the definition of the security policy and the access patterns which are used in the learning phase of the detector, the attack detection capability of an intrusion detection system also depends upon the assumptions made by individual methods for intrusion detection. The purpose of an intrusion detection system is to detect attacks. However, it is equally important to detect attacks at an early stage in order to minimize their impact. I have used Dataset and Classifier to refine Intruders in Networks.
Keywords: (IDS), (IDPS), IDP Ses.