Reference Hub2
Intrusion Detection System (IDS) and Their Types

Intrusion Detection System (IDS) and Their Types

Manoranjan Pradhan, Chinmaya Kumar Nayak, Sateesh Kumar Pradhan
Copyright: © 2016 |Pages: 17
ISBN13: 9781466687615|ISBN10: 1466687614|EISBN13: 9781466687622
DOI: 10.4018/978-1-4666-8761-5.ch009
Cite Chapter Cite Chapter

MLA

Pradhan, Manoranjan, et al. "Intrusion Detection System (IDS) and Their Types." Network Security Attacks and Countermeasures, edited by Dileep Kumar G., et al., IGI Global, 2016, pp. 228-244. https://doi.org/10.4018/978-1-4666-8761-5.ch009

APA

Pradhan, M., Nayak, C. K., & Pradhan, S. K. (2016). Intrusion Detection System (IDS) and Their Types. In D. G., M. Singh, & M. Jayanthi (Eds.), Network Security Attacks and Countermeasures (pp. 228-244). IGI Global. https://doi.org/10.4018/978-1-4666-8761-5.ch009

Chicago

Pradhan, Manoranjan, Chinmaya Kumar Nayak, and Sateesh Kumar Pradhan. "Intrusion Detection System (IDS) and Their Types." In Network Security Attacks and Countermeasures, edited by Dileep Kumar G., Manoj Kumar Singh, and M.K. Jayanthi, 228-244. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8761-5.ch009

Export Reference

Mendeley
Favorite

Abstract

Over the last two decades, computer and network security has become a main issue, especially with the increase number of intruders and hackers, therefore systems were designed to detect and prevent intruders. This chapter per the authors investigated the most important design approaches, by mainly focusing on their collecting, analysis, responding capabilities and types of current IDS products. For the collecting capability, there were two main approaches, namely host- and network-based IDSs. Therefore, a combination of the two approaches in a hybrid implementation is ideal, as it will offer the highest level of protection at all levels of system functions. The analysis capability of an IDS can be characterised by the misuse and anomaly detection approaches. Therefore, a combination of the two approaches should improve the analysis capability of an IDS i.e. hybrid of misuse and anomaly detection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.