Intrusion Detection Systems and its application in latest Networking Technologies – A Survey
Main Article Content
Abstract
The attackers are using different techniques to intrude themselves into the network or system to steal our data. The intruding techniques are increasing day by day and it is very difficult to detect the attacks. Researchers find a lot of challenges and issues to design an intrusion detection system. The growth of malicious software is growing and finding the type of catastrophic failure it will create cannot be predicted and detected. This survey presents some of the methods employed in designing the Intrusion detection Systems (IDS) and it provides insights into the various IDS techniques used in different networking technologies.
Keywords: Intrusion Detection Systems, Artificial Intelligent Techniques, Internet of Things, Wireless Sensor Networks, Mobile adhoc Networks, Cloud Computing, Blockchain Healthcare
The attackers are using different techniques to intrude themselves into the network or system to steal our data. The intruding techniques are increasing day by day and it is very difficult to detect the attacks. Researchers find a lot of challenges and issues to design an intrusion detection system. The growth of malicious software is growing and finding the type of catastrophic failure it will create cannot be predicted and detected. This survey presents some of the methods employed in designing the Intrusion detection Systems (IDS) and it provides insights into the various IDS techniques used in different networking technologies.