Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is NIDS

Encyclopedia of Multimedia Technology and Networking, Second Edition
Network intrusion detection systems. An independent platform which identifies intrusions by examining network traffic and monitors multiple hosts.
Published in Chapter:
Information Security Threats to Network Based Information Systems
Sumeet Gupta (National University of Singapore, Singapore)
DOI: 10.4018/978-1-60566-014-1.ch093
Abstract
While Internet has opened a whole new world of opportunity for interaction and business by removing many trade barriers, it has also opened up new possibilities and means of criminal acts altogether unheard of in the off-line world. Why do people commit crimes online? Perhaps, some of them attempt to gain unauthorised access to other’s money. Some people have fun doing so and there are others who do it to take revenge or to harm others. While the motivation of conducting criminal acts may be the same as in the off-line world, the manner of such criminal acts is unique to the Internet. The vulnerability of the information transmitted over Internet is the root cause of the sprawling of criminal acts over Internet. Both users and vendors become vulnerable to criminal acts that undermine security due to easy accessibility of Internet and easy exploitation of security loopholes in the Internet. These criminal acts can adversely affect Internet users, particularly online vendors and customers. Therefore, it is important that Internet users not only become conversant of such criminal acts but also take suitable measures to counter and avoid becoming victims of these criminal acts. In this article we examine some of the major information security threats to Internet users with particular emphasis on electronic commerce and propose plausible solutions for a safer online experience. The information security threats can be categorised into threats to the users, threats to the vendors, and threats to both users and vendors. Electronic embezzlement, sniffing and spoofing, and denial-of-service attacks are examples of threat to the vendor. Credit card frauds and malicious codes are examples of threats to the users. Cybervandalism and phishing are examples of threats to both users and vendors.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Survey on Network Intrusion Detection Using Deep Generative Networks for Cyber-Physical Systems
A network-based intrusion detection system is used to examine and investigate network traffic to defend a system from network-based intrusions.
Full Text Chapter Download: US $37.50 Add to Cart
Traffic Analysis of UAV Networks Using Enhanced Deep Feed Forward Neural Networks (EDFFNN)
Network intrusion detection system. NIDS is a framework used to detect intrusions in the network.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR