Scrutinizing the Art of Intrusion Detection
Abhay Limaye1, Shraddha Kakne2, Priti Tiple3, Shubhangi Bhamare4
1Abhay Limaye, Department, of Computer Engineering, MIT College of Engineering , Pune, India.
2Shraddha Kakne, Department, of Computer Engineering, MIT College of Engineering , Pune, India.
3Priti Tiple, Department, of Computer Engineering, MIT College of Engineering , Pune, India.
4Shubhangi Bhamare, Department, of Computer Engineering, MIT College of Engineering , Pune, India.
Manuscript received on March 24, 2014. | Revised Manuscript received on April 13, 2014. | Manuscript published on April 30, 2014. | PP: 356-361 | Volume-3, Issue-4, April 2014. | Retrieval Number: D2878043414/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Internet services and applications have become an inextricable part of quotidian life, enabling communication and the management of confidential information from any place imaginable. These internet services are bound to be vulnerable to attackers. Billions of dollars are lost every year in mending the systems hit by the intrusions. The means for pinpointing and tracking these intrusions are called as Intrusion Detection Systems (IDS). Intrusion Detection Systems are procuring mainstream adulation as companies move more of their critical business interactions to the Internet. Thus, hereby, in this paper, we present the dissertation on the notion of Intrusion Detection wherein we first focus on the assorted genres of attacks or intrusions. Furthermore we attempt to discern the paradigm of Intrusion Detection Systems. Denouement of this paper elaborates pragmatic benefits and unrealistic conjectures of prevalent Intrusion Detection Systems.
Keywords: Intrusion Detection System (IDS), Dos (Denial of Service), brute force Attack, SQL injection attack.