UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 8 Issue 5
May-2021
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2105730


Registration ID:
309358

Page Number

f476-f481

Share This Article


Jetir RMS

Title

Intrusion Detection System

Abstract

Abstract: Intrusion detection is the act of detecting unwanted traffic on a network or a device. An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. This article aims at providing a general presentation of the techniques and types of the intrusion detection and prevention systems and an in-depth description of the evaluation, comparison and classification features of the IDS and the IPS. Many IDS tools will also store a detected event in a log to be reviewed at a later date or will combine events with other data to make decisions regarding policies or damage control. An IPS is a type of IDS that can prevent or stop unwanted traffic. The IPS usually logs such events and related information.MachineLearning, it is a field of computer science that uses statistical techniques to give the ability to learn to the computer systems with data, Comparative study is based on Machine Learning, IDS and KDD dataset. As far as we know KDD is just a benchmark for IDS, so far, many people have researched where we came across many different algorithms ranging from decision to prediction. Almost all the parameters were used to identify which algorithm would be good for a particular metrics. We came across 42 parameters in KDD dataset. Using machine learning large amount of data to give statistical results and work can be done quickly. IDS was used to identify either the activity is malicious or non-malicious.

Key Words

Keywords—IDs intrusion detection system, KDD cup 1999 datasets, Idps intrusion detection and prevention system, Computer and network security.

Cite This Article

"Intrusion Detection System", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.8, Issue 5, page no.f476-f481, May-2021, Available :http://www.jetir.org/papers/JETIR2105730.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Intrusion Detection System", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.8, Issue 5, page no. ppf476-f481, May-2021, Available at : http://www.jetir.org/papers/JETIR2105730.pdf

Publication Details

Published Paper ID: JETIR2105730
Registration ID: 309358
Published In: Volume 8 | Issue 5 | Year May-2021
DOI (Digital Object Identifier):
Page No: f476-f481
Country: mumbai, MAHARASAHTRA, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000585

Print This Page

Current Call For Paper

Jetir RMS