| Home

Overview


Original Research

EFFECTIVE NETWORK INTRUSION DETECTION MODELING

NANCY THOMAS1, and Dr. V. SANGEETHA 2.

Vol 18, No 05 ( 2023 )   |  DOI: 10.17605/OSF.IO/B6APM   |   Author Affiliation: Research Scholar, Karpagam Academy of Higher Education (Deemed to be University), Coimbatore, India 1; Research Guide, Karpagam Academy of Higher Education (Deemed to be University), Coimbatore, India 2.   |   Licensing: CC 4.0   |   Pg no: 561-568   |   Published on: 16-05-2023

Abstract

In recent years there have been immense advancements in the internet and in relevant statement fields which have led to the uplift in the network size and the information related to it. This has led to the fact that there are more and more novel attacks happening today which have created problems for the security of a network. The ability to detect hacks and intrusions is essential for network security setup. The existence of malicious intruders who aim to commence attacks from inside the system of networks and this fact can't be disregarded. Recently there has been a system of intruder detection also known as IDS which works to stop malicious intruder attacks by inspecting the heavy frequency of traffic inside the vast network. The signature process helps in detecting intrusions on specific blueprints based on numbers in the network traffic. Signatures can easily help in detecting distrustful incoming attacks. The network intrusion detection system helps in identifying distrustful happenings and works as a vigilant detection system for the system administrator. The network intrusion detection system assists in the overall improvement of the performance of the network system. The system to detect network traffic monitors the vast network model of the computer to identify malicious activity. It studies the information that comes through the network to identify the blueprint and symptoms of malicious factors.


Keywords

IDS, Network Anomaly, Malicious Attacks, System Detection