International Conference on Software Technology and Engineering, 3rd (ICSTE 2011)
44 Abasic for Intrusion Detection System
Download citation file:
- Ris (Zotero)
- Reference Manager
In Information System, Intruders are the activities that violate(release) the security policy of the system in the computer or network. The intrusion detection system (IDS) is the process of identifying computing / network activity that is malicious or unauthorized software or a device but not to correct it. Then, the IDS is the part of defense system. In this paper, presents the basic overview about the types, categories, polices and component of the IDS. Then explain the parameters that is used to evaluate each system and describe briefly using the Data Mining, Machine Learning, Neural Network and Fuzzy Logic techniques for data processing in the system.