A Fundamental Analysis of Intrusion Detection and Intrusion Prevention System in Network
Keywords:
Network Security, Threats, PrivacyAbstract
The spread of data networks in networks and associations have prompted an every day immense volume of data trade between various networks which, obviously, has brought about new threats to the national associations. It very well may be said that data security has turned out to be today a standout amongst the most difficult zones. At the end of the day, deformities and impediments of computer network security address unsalvageable harm for undertakings. Along these lines, ID of security threats and methods for managing them is fundamental. Yet, the inquiry brought up in such manner is that what are the systems and approaches to manage security threats that must be taken to guarantee the security of computer networks? In this unique situation, the present investigation plans to complete an audit of the writing by utilizing prior looks into and library approach, to give security solutions despite threats to their computer networks. The aftereffects of this examination can prompt additionally comprehension of security threats and approaches to manage them and help to execute a safe data stage
References
U. A. Sandhu, S. Haider, S. Naseer and O. U. Ateeb, A Survey of Intrusion Detection & Prevention Techniques, International Conference on Information Communication and Management IPCSIT: IACSIT Press, Singapore 2011.
K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), Recommendations of the National Institute of Standards and Technology: NIST Special Publication, 2007.
B. Menezes, Network Security and Cryptography (Patparganj, New Delhi: Cengage Learning India Pvt. Ltd, 2010).
J. R. Vacca, Computer and information security handbook (New York: Morgan Kaufmann, Elsevier 2009) 39-66, 133-166, 255- 267, 293-306, 349-393, 469-496.
A. Fuchsberger, Intrusion Detection Systems and Intrusion Prevention Systems, Published by Elsevier: Information Security Technical Report 10, 2005, 134-139.
P. Innella, http://www.symantec.com /connect/articles/ managingintrusion-detection-systems-large-organizationspart-one.
EC-Council, Ethical Hacking and Countermeasures Version 6 Module XVII Web Application Vulnerabilities: International Council of E-commerce Consultants, 2008.
R. E. Overill, ISMS insider intrusion prevention and detection, Published in Elsevier, Information security technical report 13, 2008, 216-219.
N. Godbole, Information Systems Security: Security Management, Metrics, Frameworks and Best Practices (New Delhi: WIELY INDIA, 2009).
N. F. Mir, Computer and Communication Networks (New York: Prentice Hall, 2006), 57-60, 101-125.
B. Forouzan, Data Communications and Networking (New York: McGraw Hill, 2006), 3-23, 395-464.
A. S. Ashoor and S. Gore, Importance of Intrusion Detection system (IDS), International Journal of Scientific and Engineering Research, 2(1), 2011, 1-4.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
