Towards Configured Intrusion Detection Systems

Authors

  • Gagan Deep Sharma

  • Vivek Kumar

Keywords:

Intrusion detection system, response systems, detection-based systems, configured IDS, security violations

Abstract

This paper studies the challenges in the current intrusion detection system and comparatively analyzes the active and passive response systems. The paper studies the existing IDS and their usefulness in detecting and preventing attacks in any type of network and control traffic with the performance of the system to be improved. The study also evaluates the emerging avenues in Intrusion Detection System and explores the possible future avenues in intrusion detection scheme. It is observed that the detection-based systems have started to gain popularity in the IT security domain. The paper highlights the need to implement an appropriately configured IDS since an optimally configured IDS deters hackers, thus, reducing the need for investigation by security experts for security violations.

How to Cite

Gagan Deep Sharma, & Vivek Kumar. (2016). Towards Configured Intrusion Detection Systems. Global Journal of Computer Science and Technology, 16(E4), 1–10. Retrieved from https://computerresearch.org/index.php/computer/article/view/1402

Towards Configured Intrusion Detection Systems

Published

2016-03-15