Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published July 30, 2020 | Version v1
Journal article Open

Diverse Methods for Signature based Intrusion Detection Schemes Adopted

  • 1. Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India
  • 2. Department of Computer Science and Engineering, Panjabi University, Patiala, India
  • 3. Engineering Department, Infosys Limited, Chandigarh, India
  • 1. Publisher

Description

Intrusion Detection Systems (IDS) is used as a tool to detect intrusions on IT networks, providing support in network monitoring to identify and avoid possible attacks. Most such approaches adopt Signature-based methods for detecting attacks which include matching the input event to predefined database signatures. Signature based intrusion detection acts as an adaptable device security safeguard technology. This paper discusses various Signature-based Intrusion Detection Systems and their advantages; given a set of signatures and basic patterns that estimate the relative importance of each intrusion detection system feature, system administrators may help identify cyber-attacks and threats to the network and Computer system. Eighty percent of incidents can be easily and promptly detected using signature-based detection methods if used as a precautionary phase for vulnerability detection and twenty percent rest by anomaly-based intrusion detection system that involves comparing definitions of normal activity or event behavior with observed events in identifying the significant deviations and deciding the traffic to flag.

Files

A2791059120.pdf

Files (625.3 kB)

Name Size Download all
md5:5e752d991b13c4c273a779e081aa6480
625.3 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2277-3878 (ISSN)

Subjects

ISSN
2277-3878
Retrieval Number
A2791059120/2020©BEIESP