So in order to provide security to our network we try to find the intrusion in our network by some methods. Somehow, intrusion is inevitable now as with the increased popularity of network now a day everything is being done or shared staying in the network and wireless networks being prone to so many attacks our information is something which needs to be secured. Characteristics of computational intelligence (CI) systems, such as adaptation, fault tolerance, high computational speed and error resilience in the face of noisy information t the requirements of building a good intrusion detection model. Intrusion detection is based on computability and analysis based on statistics. It can be someone who is a legitimate user but isnt given a privilege to use the service it is already been using or someone who is not a legitimate user. It has its certain types an intruder can be a misfeasor or a masquerade. of Computer Science, HMR Institute of Technology and Management, DelhiĪbstract:- Initially, what is intrusion? An intrusion or an intruder is someone who is accessing the resources in a network without being a legitimate user to use that resource. Performance Evaluation of Network based Intrusion Detection Techniques with Raspberry Pi – a Comparative Analysisĭept.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |