z-logo
open-access-imgOpen Access
Diverse Methods for Signature based Intrusion Detection Schemes Adopted
Author(s) -
Jyoti Verma,
Abhinav Bhandari,
Vidhu Baggan,
Ritu Manish Snehi
Publication year - 2020
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.a2791.079220
Subject(s) - intrusion detection system , anomaly based intrusion detection system , computer science , signature (topology) , vulnerability (computing) , data mining , anomaly detection , event (particle physics) , computer security , network security , host based intrusion detection system , feature (linguistics) , set (abstract data type) , intrusion prevention system , philosophy , physics , geometry , linguistics , mathematics , quantum mechanics , programming language
Intrusion Detection Systems (IDS) is used as a tool to detect intrusions on IT networks, providing support in network monitoring to identify and avoid possible attacks. Most such approaches adopt Signature-based methods for detecting attacks which include matching the input event to predefined database signatures. Signature based intrusion detection acts as an adaptable device security safeguard technology. This paper discusses various Signature-based Intrusion Detection Systems and their advantages; given a set of signatures and basic patterns that estimate the relative importance of each intrusion detection system feature, system administrators may help identify cyber-attacks and threats to the network and Computer system. Eighty percent of incidents can be easily and promptly detected using signature-based detection methods if used as a precautionary phase for vulnerability detection and twenty percent rest by anomaly-based intrusion detection system that involves comparing definitions of normal activity or event behavior with observed events in identifying the significant deviations and deciding the traffic to flag.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here