Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Intrusion Detection Systems

Handbook of Research on Public Information Technology
They detect inappropriate, incorrect, or anomalous activity. ID systems that operate on a host to detect malicious activity on that host are called host-based ID systems. ID systems that operate on network data flows are called network-based ID systems.
Published in Chapter:
The Role of Data Mining in Intrusion Detection Technology
Amalia Agathou (University of the Aegean, Greece) and Theodoros Tzouramanis (University of the Aegean, Greece)
Copyright: © 2008 |Pages: 11
DOI: 10.4018/978-1-59904-857-4.ch044
Abstract
Over the past few years, the Internet has changed computing as we know it. The more possibilities and opportunities develop, the more systems are subject to attack by intruders. Thus, the big question is about how to recognize and handle subversion attempts. One answer is to undertake the prevention of subversion itself by building a completely secure system. However, the complete prevention of breaches of security does not yet appear to be possible to achieve. Therefore these intrusion attempts need to be detected as soon as possible (preferably in real time) so that appropriate action might be taken to repair the damage. This is what an intrusion detection system (IDS) does. IDSs monitor and analyze the events occurring in a computer system in order to detect signs of security problems. However, intrusion detection technology has not yet reached perfection. This fact has provided data mining with the opportunity to make several important contributions and improvements to the field of IDS technology (Julisch, 2002).
Full Text Chapter Download: US $37.50 Add to Cart
More Results
AI-Based Cyber Defense for More Secure Cyberspace
Device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways.
Full Text Chapter Download: US $37.50 Add to Cart
Crime Identification Using Traffic Analysis of HTTP Botnet
An intrusion detection system (IDS) is a hardware device or software application that monitors a network or systems for malicious activity or policy violations.
Full Text Chapter Download: US $37.50 Add to Cart
Internet of Things, Security of Data, and Cyber Security
Also known as Intrusion Detection System refers to the technical means of discovering unauthorized access in a network.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR