A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools

A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools

Manjunath Kotari, Niranjan N. Chiplunkar
Copyright: © 2020 |Pages: 28
ISBN13: 9781799822424|ISBN10: 1799822427|EISBN13: 9781799822431
DOI: 10.4018/978-1-7998-2242-4.ch005
Cite Chapter Cite Chapter

MLA

Kotari, Manjunath, and Niranjan N. Chiplunkar. "A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools." Handbook of Research on Intrusion Detection Systems, edited by Brij B. Gupta and Srivathsan Srinivasagopalan, IGI Global, 2020, pp. 77-104. https://doi.org/10.4018/978-1-7998-2242-4.ch005

APA

Kotari, M. & Chiplunkar, N. N. (2020). A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools. In B. Gupta & S. Srinivasagopalan (Eds.), Handbook of Research on Intrusion Detection Systems (pp. 77-104). IGI Global. https://doi.org/10.4018/978-1-7998-2242-4.ch005

Chicago

Kotari, Manjunath, and Niranjan N. Chiplunkar. "A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools." In Handbook of Research on Intrusion Detection Systems, edited by Brij B. Gupta and Srivathsan Srinivasagopalan, 77-104. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2242-4.ch005

Export Reference

Mendeley
Favorite

Abstract

Cyber crime is a serious threat for day-to-day transactions of the digital life. Overexposure of the personal details in social networks will lead to the cyber crime case. Therefore, detection and monitoring of cyber crime are challenging tasks. The cyber criminals are continually flooding the various intrusions all over the network. The cyber safety team should have a noteworthy challenge of filtering various such information. Continuous nonstop cyberattacks or intrusion examinations by security tools will significantly improve the threat alerts. However, cyber security becomes more expensive in the case of the above methods. The chapter provides systematic survey of various cyber security threats, evolution of intrusion detection systems, various monitoring mechanisms, open source cyber security monitoring tools, and various assessment techniques. The chapter also proposes a model of Cyber security detection and monitoring system and its challenges.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.