REVIEW ON SECURITY OF MULTIMEDIA DATA OVER DISTRIBUTED NETWORK OVER IDS
Keywords:
Network Security, Intrusion Detection System, intrusion detectionAbstract
Organizational strategy and infrastructure for protecting data transmissions and physical assets across computer networks. Security in a network takes the form of both hardware and software measures. When asked to define network security, most people focus only on the tools used to monitor and punish breaches. Multimedia includes visuals, sound, moving pictures, and text. The majority of multimedia files tend to be somewhat large. This research includes thorough information about kinds of IDS, life cycle, diverse domains, forms of assaults & tools. Intrusion detection systems are becoming more important for the day-to-day safety of businesses and their network users. IPS specifies about preventive measures for security. In lifetime phases evolved & stages are represented. There are, however, additional hurdles to jump.
References
Anita K. Jones & Robert S. Sielken –“Computer System Intrusion Detection A Survey “International Journal of Computer Theory & Engineering, Vol.2, No.6, December, 2010
Vera Marinova-Boncheva-“A Short Survey of Intrusion Detection Systems”-. Bulgarian
academy of sciences.
Carl Endorf, Eugene Schultz, Jim Mellander “Intrusion detection & prevention” by Writtenpublished by McGraw-Hill.
“Top 125 Network Security Tools”- SecTools.Org- http://sectools.org/tag/ids/sec
PeymanKabiri & Ali A.Ghorbani-“Research on Intrusion Detection & Response Survey”- International Journal of Network Security, Vol.1, No.2, PP.84–102, Sep. 2005
Christopher Low –“Understanding Wireless attacks &detection “-GIAC Security Essentials Certification (GSEC) Practical Assignment 13 April 2005 -SANS Institute InfoSec Reading Room.
Bace, Rebecca-“An Introduction to Intrusion Detection &Assessment”- Infidel, Inc. for ICSA, Inc
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.