Ali Elsadai, Juma Ibrahim, Fathai Hajjaj, Petar Jakić
{"title":"入侵检测系统方法与技术概述","authors":"Ali Elsadai, Juma Ibrahim, Fathai Hajjaj, Petar Jakić","doi":"10.15308/Sinteza-2019-155-161","DOIUrl":null,"url":null,"abstract":"System and network security is still the main concern for researchers and system administrators. Different types of software and hardware devices are used to eliminate the dangers of hacking, attacks, breakthroughs, and cybercrimes. With the increasing creativity of attackers, the development of a complete security system is impossible. In network security, no other tools are available as Intrusion Detection System (IDS), which has the ability to locate and identify malicious activities by examining network traffic. It provides administrators with reliable network monitoring and control. In this paper, we give an overview of the Intrusion Detection System principles, types, methods, and detection techniques.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"282 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The Overview of Intrusion Detection System Methods and Techniques\",\"authors\":\"Ali Elsadai, Juma Ibrahim, Fathai Hajjaj, Petar Jakić\",\"doi\":\"10.15308/Sinteza-2019-155-161\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"System and network security is still the main concern for researchers and system administrators. Different types of software and hardware devices are used to eliminate the dangers of hacking, attacks, breakthroughs, and cybercrimes. With the increasing creativity of attackers, the development of a complete security system is impossible. In network security, no other tools are available as Intrusion Detection System (IDS), which has the ability to locate and identify malicious activities by examining network traffic. It provides administrators with reliable network monitoring and control. In this paper, we give an overview of the Intrusion Detection System principles, types, methods, and detection techniques.\",\"PeriodicalId\":342313,\"journal\":{\"name\":\"Proceedings of the International Scientific Conference - Sinteza 2019\",\"volume\":\"282 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the International Scientific Conference - Sinteza 2019\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.15308/Sinteza-2019-155-161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the International Scientific Conference - Sinteza 2019","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15308/Sinteza-2019-155-161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Overview of Intrusion Detection System Methods and Techniques
System and network security is still the main concern for researchers and system administrators. Different types of software and hardware devices are used to eliminate the dangers of hacking, attacks, breakthroughs, and cybercrimes. With the increasing creativity of attackers, the development of a complete security system is impossible. In network security, no other tools are available as Intrusion Detection System (IDS), which has the ability to locate and identify malicious activities by examining network traffic. It provides administrators with reliable network monitoring and control. In this paper, we give an overview of the Intrusion Detection System principles, types, methods, and detection techniques.