Intrusion Detection Systems Term Paper by ResearchRiter

Intrusion Detection Systems
This paper investigates data fusion used for intrusion detection systems.
# 120735 | 1,500 words | 24 sources | MLA | 2008 | US
Published on Dec 01, 2008 in Computer and Technology (General)

$19.95 Buy and instantly download this paper now


The paper looks at the best technique in terms of proposing a system to be developed and a look at the frequency of data required for deducing that an event is occurring.

From the Paper:

"Intrusion detection systems rely on input from various sources such as firewalls, myriad sensor motes, system log files, packet sniffers, simple network management protocol (SNMP) traps and queries, user profile databases system messages and operator commands. (Bass) There are additional detection devices that measure the effectiveness of the network's security solution-network scanners vulnerability, scanners, risk analysis tools and policy enforcement tools-as well as war dialers, port scanners, database scanners, traffic analysis and IT analysis tools. These sources can potentially generate a..."

Cite this Term Paper:

APA Format

Intrusion Detection Systems (2008, December 01) Retrieved February 26, 2024, from

MLA Format

"Intrusion Detection Systems" 01 December 2008. Web. 26 February. 2024. <>