Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 21, Pages: 1-7
Gharaee Hossein1 , Seifi Shokoufeh2* and Solat Abozar1
1 Iran Telecom Research Center, [email protected]
2 Department of Computer Engineering University of Tehran, [email protected]
*Author For Correspondence
Department of Computer Engineering University of Tehran,
The usual approach of Intrusion Detection System (IDS) systematic is according to model compatibility which determines the vandalism happening on the network using particular models and orders. To perform this algorithm, casual manner of the network are evaluated by modeling and in the next step it utilized as a draft model for specifying unusual manner. This paper, wants to determine and select the most efficient procedure for this performance by investigation, application and also gathering all kinds of model compatibility technique so that the most proper result is achieved over compatibility known attacks with original models. In this study, to gather all procedures associated with the subject, we surveyed the expressing of model adoption performance from various views. The other context of this study is to evaluate the items for setting the procedures whereas the algorithms are categorized according to significant items which has more influence on the operating of model adoption performance.
Keywords: Intrusion Detection System, Network, Model Compatibility, Search Procedure
Subscribe now for latest articles and news.