A Review of Intrusion Detection Systems
The transformation of vast amount of information through the network channels appeared widely from one site to another and these information may be disclosed to the third party or the attackers. Thus, the protection process of transformed information is a complex process that can be established through the Intrusion Detection System (IDS). Concealment and unity of information are the most important issues achieved through the intrusion detection system. The process of intrusion detection can be used with wireless or wired networks via making use of hardware or software techniques. Consequently, this caused to have lots of new techniques for IDS in various environments and different levels of network. Unfortunately, most of these techniques do not implemented together for increasing the security of the network. This leaded us to provide a review of the recent papers including a general view of intrusion detection in various environments through the networking and using various techniques. As a result, the most important intend for this paper is to embrace the most new progressions in this region. This may help the researchers to have a general knowledge on different techniques for protection through IDS and various types of intrusion and its detection techniques.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
AJNU is committed to protecting the privacy of the users of this journal website. The names, personal particulars and e-mail addresses entered in this website will be used only for the stated purposes of this journal and will not be made available to third parties without the user's permission or due process. Users consent to receive communication from the AJNU for the stated purposes of the journal. Queries with regard to privacy may be directed to email@example.com.