A REVIEW ON VARIETY OF INTRUSION DETECTION SYSTEM AND THEIR FUNCTIOAL APPROACHES
Keywords:
Classifiers, Decryption, Encryption Intrusion Detection System, Optimization techniques, Mobile Agent etc.Abstract
It is being found that the increase of variety of network types network protection becomes a great challenge. This leads the necessity increase for data and increasingly exchanging information. Intrusion Detection Systems (IDS) are there to try to abolish unauthorized use of it in way of identifying abuse and misuse of computer systems. In response to the growth in the use and development of IDSs, it would most important aspect. In this article, we identify a number of general technical optimization of IDS. This item Provides die details of the methodology, including strategies for intrusion. This article contains also general information about IDS intrusions and our work to motivate. This article deals with mainly various methods of optimization and classification. Here different approaches are mentioned associated with Intrusion Detection Systems