Research Info

Home \مقایسه روش های شناسایی سیستم ...
Title مقايسه روش هاي شناسايي سيستم هاي تشخيص نفوذ ) IDS )
Type Presentation
Keywords Infiltration detection system, malicious attack, hackers
Abstract A device or software that monitors or identifies the network for malicious or unauthorized activities is called an intrusion detection system. IDS (Infiltration) may be stopped by some systems, but this is neither expected nor required by the system. Supervision. Recognize possible events, list information about them, and report content to diagnostic systems And intrusion prevention is centralized) IDPs (intrusion detection systems, either unauthorized access or abuse of access) Identifies computer networks and resources and is essentially an attack on those resources. Consumers must be aware of the destructive attack There is a growing concern that they are concerned about how to protect and connect digital data in a more secure way. Apply. For valuable information, hackers use a variety of attacks that are made by many techniques Infiltration detection, algorithms and methods are identified. In this project, the system of penetration detection, classification or types of techniques Its diagnosis is discussed
Researchers gholamreza Ahmadi (Second researcher)