DocumentCode
2151304
Title
Comparative study of intrusion detection system and its Recovery mechanism
Author
Khan, Nabeel Younus ; Rauf, Bilal ; Ahmed, Kabeer
Author_Institution
Comput. Sci. Dept., Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
Volume
5
fYear
2010
fDate
26-28 Feb. 2010
Firstpage
627
Lastpage
631
Abstract
Organizations require flexible and adaptable intrusion detection systems to combat increasing internal and external threats. To meet organizational objectives and requirements the intrusion detection systems must be effective. This paper analyzes Intrusion Detection Systems ability to detect the intrusions in computer systems after a thorough comparative theoretical study. Different security threats are made on the networks and are caused by the intruders who either misuse the assigned privileges or access the systems via internet. Conclusive analysis of this paper indicates that security can be best achieved by using anomaly detection mechanism in Host Based IDS with Centralized Strategy. Proposed analysis is based on necessary security objectives required by different organizations and the variety of security threats which we encounter in our every daily life. Paper also highlights the mechanism of data recovery from corrupted processes, which can be incorporated in any Intrusion detection system.
Keywords
Internet; security of data; system recovery; Internet; anomaly detection mechanism; centralized strategy; computer systems; external threats; internal threats; intrusion detection system; recovery mechanism; security threats; Computer science; Computer security; Data security; Educational institutions; IP networks; Information security; Internet; Intrusion detection; Monitoring; National security; Anomaly detection; Depenedemcy rule; Firewalls; Session Snipping; Tainting Algorithm;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on
Conference_Location
Singapore
Print_ISBN
978-1-4244-5585-0
Electronic_ISBN
978-1-4244-5586-7
Type
conf
DOI
10.1109/ICCAE.2010.5451308
Filename
5451308
Link To Document