{"title":"全面调查入侵检测的各种硬件和软件","authors":"Venkataramesh Bontupalli, T. Taha","doi":"10.1109/NAECON.2015.7443081","DOIUrl":null,"url":null,"abstract":"The growth of digital technology have dramatically increased the security threats for computer networks over the last decade. Intrusion detection and prevention systems are designed to prevent and avoid any malicious attempts into the systems employing different types of hardware, software and classifiers. There are numerous studies developed to identify the virus attacks, protect the system from unauthorized access, abnormal activities, and strengthen the cyber security of the critical systems. With the increase in the security mechanisms and its technology, there is a great need for a structured and a broad overview of extensive research on intrusion detection systems to identify the different approaches, different solutions along with its strengths and weakness. In this paper, we will focus and describe the greatest contributions to effective Intrusion Detection System (IDS) to provide as a basis for future researchers the present challenges and issues in designing an intrusion detection system that could provide high performance, inherent learning capability and yet consume low power.","PeriodicalId":133804,"journal":{"name":"2015 National Aerospace and Electronics Conference (NAECON)","volume":"29 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Comprehensive survey on intrusion detection on various hardware and software\",\"authors\":\"Venkataramesh Bontupalli, T. Taha\",\"doi\":\"10.1109/NAECON.2015.7443081\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The growth of digital technology have dramatically increased the security threats for computer networks over the last decade. Intrusion detection and prevention systems are designed to prevent and avoid any malicious attempts into the systems employing different types of hardware, software and classifiers. There are numerous studies developed to identify the virus attacks, protect the system from unauthorized access, abnormal activities, and strengthen the cyber security of the critical systems. With the increase in the security mechanisms and its technology, there is a great need for a structured and a broad overview of extensive research on intrusion detection systems to identify the different approaches, different solutions along with its strengths and weakness. In this paper, we will focus and describe the greatest contributions to effective Intrusion Detection System (IDS) to provide as a basis for future researchers the present challenges and issues in designing an intrusion detection system that could provide high performance, inherent learning capability and yet consume low power.\",\"PeriodicalId\":133804,\"journal\":{\"name\":\"2015 National Aerospace and Electronics Conference (NAECON)\",\"volume\":\"29 2\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 National Aerospace and Electronics Conference (NAECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAECON.2015.7443081\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 National Aerospace and Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.2015.7443081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comprehensive survey on intrusion detection on various hardware and software
The growth of digital technology have dramatically increased the security threats for computer networks over the last decade. Intrusion detection and prevention systems are designed to prevent and avoid any malicious attempts into the systems employing different types of hardware, software and classifiers. There are numerous studies developed to identify the virus attacks, protect the system from unauthorized access, abnormal activities, and strengthen the cyber security of the critical systems. With the increase in the security mechanisms and its technology, there is a great need for a structured and a broad overview of extensive research on intrusion detection systems to identify the different approaches, different solutions along with its strengths and weakness. In this paper, we will focus and describe the greatest contributions to effective Intrusion Detection System (IDS) to provide as a basis for future researchers the present challenges and issues in designing an intrusion detection system that could provide high performance, inherent learning capability and yet consume low power.