z-logo
open-access-imgOpen Access
Efficient Working of Signature Based Intrusion Detection Technique in Computer Networks
Author(s) -
Abid Hussain,
Praveen Kumar Sharma
Publication year - 2019
Publication title -
international journal of scientific research in computer science, engineering and information technology
Language(s) - English
Resource type - Journals
ISSN - 2456-3307
DOI - 10.32628/cseit195215
Subject(s) - intrusion detection system , computer science , host based intrusion detection system , computer security , digital signature , network packet , anomaly based intrusion detection system , network security , intrusion prevention system , signature (topology) , intrusion , information security , hash function , geometry , mathematics , geochemistry , geology
The subject of Computer Network Intrusion Detection System (IDS) is a very interesting research topic actively pursued by many investigators. The goal of intrusion detection is to monitor network assets and to detect anomalous behaviour and misuse. This concept has been around for the past several years but only recently, it has seen a dramatic rise in interest of researchers and system developers for incorporation into the overall information security infrastructure. In today's world, the concept of information has been moved to the digital size from conventional size. Protection of the data stored in the digital archive and is easily accessibility at any time have become a quite important phenomenon. In this concept, intrusion detection and prevention systems as security tools are widely used today [1]. In this paper, a signature based intrusion detection system approach has been proposed for computer network security. This paper is based on the efficient working of the Signature based intrusion detection method and protects the computer network against the intrusion or the unspecified packets.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here