Title :
Comparative study of intrusion detection system and its Recovery mechanism
Author :
Khan, Nabeel Younus ; Rauf, Bilal ; Ahmed, Kabeer
Author_Institution :
Comput. Sci. Dept., Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
Abstract :
Organizations require flexible and adaptable intrusion detection systems to combat increasing internal and external threats. To meet organizational objectives and requirements the intrusion detection systems must be effective. This paper analyzes Intrusion Detection Systems ability to detect the intrusions in computer systems after a thorough comparative theoretical study. Different security threats are made on the networks and are caused by the intruders who either misuse the assigned privileges or access the systems via internet. Conclusive analysis of this paper indicates that security can be best achieved by using anomaly detection mechanism in Host Based IDS with Centralized Strategy. Proposed analysis is based on necessary security objectives required by different organizations and the variety of security threats which we encounter in our every daily life. Paper also highlights the mechanism of data recovery from corrupted processes, which can be incorporated in any Intrusion detection system.
Keywords :
Internet; security of data; system recovery; Internet; anomaly detection mechanism; centralized strategy; computer systems; external threats; internal threats; intrusion detection system; recovery mechanism; security threats; Computer science; Computer security; Data security; Educational institutions; IP networks; Information security; Internet; Intrusion detection; Monitoring; National security; Anomaly detection; Depenedemcy rule; Firewalls; Session Snipping; Tainting Algorithm;
Conference_Titel :
Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-5585-0
Electronic_ISBN :
978-1-4244-5586-7
DOI :
10.1109/ICCAE.2010.5451308