Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Intrusion Prevention System

Handbook of Research on Telecommunications Planning and Management for Business
A computer security system that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities.
Published in Chapter:
Modeling Intrusion Detection with Self Similar Traffic in Enterprise Networks
Cajetan M. Akujuobi (Prairie View A & M University, USA) and Nana K. Ampah (Prairie View A & M University, USA)
DOI: 10.4018/978-1-60566-194-0.ch048
Abstract
Most of the existing networks (e.g., telecommunications, industrial control, enterprise networks etc.) have been globally connected to open computer networks (Internet) in order to decentralize planning, management and controls in business. Most of these networks were originally designed without security considerations, thereby making them vulnerable to cyber attacks. This has given rise to the need for efficient and scalable intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) to secure existing networks. Existing IDSs and IPSs have five major limitations, which prevent them from securing networks absolutely. It has been proven that the right combination of security techniques always protects networks better. This approach used change in Hurst parameter and a signal processing application of wavelets (i.e., multi-resolution technique) to develop an IDS. The novelty of our proposed IDS technique presented in this chapter lies in its efficiency and ability to eliminate most of the limitations of existing IDSs and IPSs, thereby ensuring high level network protection.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Methodology for Cyber Security Risk Mitigation in Next Generation SCADA Systems
A hardware and/or software product that block suspicious activity attempting to stop detected possible incidents. Basically, this system is extension of intrusion detection system.
Full Text Chapter Download: US $37.50 Add to Cart
A Holistic Perspective of Security in Health Related Virtual Communities
A system which is able to block any suspicious traffic based on the characteristics of the received data and guarantees authorized access to the community information and services
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR