Wednesday, July 30, 2014

Intrusion Detection System

Intrusion Detection System (IDS) attempt to identify Computer system intrusion and misuse by gathering and analyzing data. IDSs have traditionally been developed to detect intrusion and misuse for wired system and networks. More recently, IDSs have been developed for use on wireless networks. These wireless IDSs can monitor and analyze user and system activities of known attacks, identify abnormal network activity and detect policy violations. Wireless IDSs gather all local wireless transmissions and generate alerts based either on predefined signatures or on anomalies in the traffic.

A wireless Intrusion Detection System is similar to a standard, wired IDS, but has additional deployment requirements as well as some unique features specify to intrusion and misuse detection.

Intrusion Detection System can be used for monitoring file system for changes. Intrusion Detection System can be helpful in detecting if an intrusion has been occurred and what changes are made to system.

An Intrusion Detection System is used to detect several types of malicious behaviour that can compromise the security and trust of computer system. We intend to avoid the access and keep track of the intruders attempts and intrusions.



more >> Intrusion Detection System

No comments:

Post a Comment