Skip to Main Content
ASME Press Select Proceedings

International Conference on Software Technology and Engineering, 3rd (ICSTE 2011)

By
Mohamed Othman
Mohamed Othman
Search for other works by this author on:
Raja Suzana Raja Kasim
Raja Suzana Raja Kasim
Search for other works by this author on:
ISBN:
9780791859797
No. of Pages:
760
Publisher:
ASME Press
Publication date:
2011

In Information System, Intruders are the activities that violate(release) the security policy of the system in the computer or network. The intrusion detection system (IDS) is the process of identifying computing / network activity that is malicious or unauthorized software or a device but not to correct it. Then, the IDS is the part of defense system. In this paper, presents the basic overview about the types, categories, polices and component of the IDS. Then explain the parameters that is used to evaluate each system and describe briefly using the Data Mining, Machine Learning, Neural Network and Fuzzy Logic techniques for data processing in the system.

This content is only available via PDF.
Close Modal
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close Modal
Close Modal