抽象的

Study of intrusion detection systems

Cao Yonghui


This paper presents the methodologies of IDS technologies. Essentially, any system requiring security must be protected from attacks. Intrusiondetection systems are used to detect unusual activity in a network of computer systems to identify if activity is unfriendly or unauthorized in order to enable a response to that violation. To achieve this, there are two main types of IDS: network-based and host-based. This paper outlines these two types of IDS respectively and highlights the advantages of each kind.


免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证

索引于

  • 中国社会科学院
  • 谷歌学术
  • 打开 J 门
  • 中国知网(CNKI)
  • 引用因子
  • 宇宙IF
  • 研究期刊索引目录 (DRJI)
  • 秘密搜索引擎实验室
  • 学术文章影响因子(SAJI))
  • ICMJE

查看更多

期刊国际标准号

期刊 h 指数

Flyer