P. Sharma, Aman Gupta, D. Chakraborty, P. Mondal, Santu Banerjee, Kumardeep Chakraborty, Drik Dey, Rounak Chakraborty, Debangshu Das, Tuhin Ghoshal, Anirban Sinha, Souvik Mondal, Soumyadeep Pal, Rahul Sharma, Shreya Gorai, Suvankar Roy, Bhaswat Jyoti Das, Aniket Dey, Siddhartha Sarker, Sourav Saha, Rohan Poddar, Nabanit Saha, S. Dubey, Rohan Singh, Surajit Das, Debanik Hazra, Saikat Das
{"title":"入侵检测技术克服网络攻击的简要研究","authors":"P. Sharma, Aman Gupta, D. Chakraborty, P. Mondal, Santu Banerjee, Kumardeep Chakraborty, Drik Dey, Rounak Chakraborty, Debangshu Das, Tuhin Ghoshal, Anirban Sinha, Souvik Mondal, Soumyadeep Pal, Rahul Sharma, Shreya Gorai, Suvankar Roy, Bhaswat Jyoti Das, Aniket Dey, Siddhartha Sarker, Sourav Saha, Rohan Poddar, Nabanit Saha, S. Dubey, Rohan Singh, Surajit Das, Debanik Hazra, Saikat Das","doi":"10.1109/IEMECON.2017.8079622","DOIUrl":null,"url":null,"abstract":"At every place on this globe attacks on banking systems, national databases, national security using internet and other sophisticated technologies are very serious threat. Due to enormous amplification of internet use, incidents of breaking of security have increased many folds. Various organizations do not have systems to attack. Some techniques like Intrusion Detection techniques succor against these attacks and protect the data, vital information of national security. Intrusion Detection systems are essential part of defensive measurements to safeguard our systems and networks from attack. This study gives account of some of the Intrusion Detection techniques that are useful for the intendment of security of systems and network.","PeriodicalId":231330,"journal":{"name":"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A brief study of intrusion detection techniques to overcome cyber attacks\",\"authors\":\"P. Sharma, Aman Gupta, D. Chakraborty, P. Mondal, Santu Banerjee, Kumardeep Chakraborty, Drik Dey, Rounak Chakraborty, Debangshu Das, Tuhin Ghoshal, Anirban Sinha, Souvik Mondal, Soumyadeep Pal, Rahul Sharma, Shreya Gorai, Suvankar Roy, Bhaswat Jyoti Das, Aniket Dey, Siddhartha Sarker, Sourav Saha, Rohan Poddar, Nabanit Saha, S. Dubey, Rohan Singh, Surajit Das, Debanik Hazra, Saikat Das\",\"doi\":\"10.1109/IEMECON.2017.8079622\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"At every place on this globe attacks on banking systems, national databases, national security using internet and other sophisticated technologies are very serious threat. Due to enormous amplification of internet use, incidents of breaking of security have increased many folds. Various organizations do not have systems to attack. Some techniques like Intrusion Detection techniques succor against these attacks and protect the data, vital information of national security. Intrusion Detection systems are essential part of defensive measurements to safeguard our systems and networks from attack. This study gives account of some of the Intrusion Detection techniques that are useful for the intendment of security of systems and network.\",\"PeriodicalId\":231330,\"journal\":{\"name\":\"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)\",\"volume\":\"376 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEMECON.2017.8079622\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMECON.2017.8079622","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A brief study of intrusion detection techniques to overcome cyber attacks
At every place on this globe attacks on banking systems, national databases, national security using internet and other sophisticated technologies are very serious threat. Due to enormous amplification of internet use, incidents of breaking of security have increased many folds. Various organizations do not have systems to attack. Some techniques like Intrusion Detection techniques succor against these attacks and protect the data, vital information of national security. Intrusion Detection systems are essential part of defensive measurements to safeguard our systems and networks from attack. This study gives account of some of the Intrusion Detection techniques that are useful for the intendment of security of systems and network.