Ali Elsadai, Juma Ibrahim, Fathai Hajjaj, Petar Jakić
{"title":"The Overview of Intrusion Detection System Methods and Techniques","authors":"Ali Elsadai, Juma Ibrahim, Fathai Hajjaj, Petar Jakić","doi":"10.15308/Sinteza-2019-155-161","DOIUrl":null,"url":null,"abstract":"System and network security is still the main concern for researchers and system administrators. Different types of software and hardware devices are used to eliminate the dangers of hacking, attacks, breakthroughs, and cybercrimes. With the increasing creativity of attackers, the development of a complete security system is impossible. In network security, no other tools are available as Intrusion Detection System (IDS), which has the ability to locate and identify malicious activities by examining network traffic. It provides administrators with reliable network monitoring and control. In this paper, we give an overview of the Intrusion Detection System principles, types, methods, and detection techniques.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"282 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the International Scientific Conference - Sinteza 2019","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15308/Sinteza-2019-155-161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
System and network security is still the main concern for researchers and system administrators. Different types of software and hardware devices are used to eliminate the dangers of hacking, attacks, breakthroughs, and cybercrimes. With the increasing creativity of attackers, the development of a complete security system is impossible. In network security, no other tools are available as Intrusion Detection System (IDS), which has the ability to locate and identify malicious activities by examining network traffic. It provides administrators with reliable network monitoring and control. In this paper, we give an overview of the Intrusion Detection System principles, types, methods, and detection techniques.