Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{169699,
author = {Nishant Kumar and Prakashraj and Himanshu pathak and Prince kumar and Divyam Gandhi and neetu bala},
title = {NETWORK INTRUSION DETECTION SYSTEM},
journal = {International Journal of Innovative Research in Technology},
year = {2024},
volume = {11},
number = {6},
pages = {2084-2089},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=169699},
abstract = {An important cybersecurity tool for keeping an eye on network traffic for questionable activity and possible dangers like hostile assaults or unauthorized access is a network intrusion detection system, or NIDS. NIDS finds abnormalities that might point to an intrusion attempt by examining traffic patterns and contrasting them with baselines of typical activity or known indicators of malicious activity. Typically, this system includes a management console to notify network administrators, sensors to collect data, and analyzers for processing. Although NIDS improves network security by facilitating real-time monitoring and response, it has drawbacks such as high false positive rates, managing encrypted traffic, and thwarting attackers' evasion techniques. Popular NIDS tools, such as Zeek, Suricata, and Snort, offer a variety of detection features catered to various network security requirements.},
keywords = {Network security, Intrusion Detection, Anomaly Detection, Signature -Based Detection, Traffic monitoring .},
month = {November},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry