Abasic for Intrusion Detection System


In Information System, Intruders are the activities that violate(release) the security policy of the system in the computer or network. The intrusion detection system (IDS) is the process of identifying computing / network activity that is malicious or unauthorized software or a device but not to correct it. Then, the IDS is the part of defense system. In this paper, presents the basic overview about the types, categories, polices and component of the IDS. Then explain the parameters that is used to evaluate each system and describe briefly using the Data Mining, Machine Learning, Neural Network and Fuzzy Logic techniques for data processing in the system.

  • Abstract
  • Key Words
  • 1 Introduction
  • 2. Terminology
  • 3. IDS Methodology
  • 4. Efficiency of IDS
  • 5. Taxonomy Elements
  • 6. Data Processing Techniques
  • Summary
  • References

Related Content

Customize your page view by dragging and repositioning the boxes below.

Related Journal Articles
Related eBook Content
Topic Collections

Sorry! You do not have access to this content. For assistance or to subscribe, please contact us:

  • TELEPHONE: 1-800-843-2763 (Toll-free in the USA)
  • EMAIL: asmedigitalcollection@asme.org
Sign In