NETWORK INTRUSION DETECTION SYSTEM

  • Unique Paper ID: 169699
  • PageNo: 2084-2089
  • Abstract:
  • An important cybersecurity tool for keeping an eye on network traffic for questionable activity and possible dangers like hostile assaults or unauthorized access is a network intrusion detection system, or NIDS. NIDS finds abnormalities that might point to an intrusion attempt by examining traffic patterns and contrasting them with baselines of typical activity or known indicators of malicious activity. Typically, this system includes a management console to notify network administrators, sensors to collect data, and analyzers for processing. Although NIDS improves network security by facilitating real-time monitoring and response, it has drawbacks such as high false positive rates, managing encrypted traffic, and thwarting attackers' evasion techniques. Popular NIDS tools, such as Zeek, Suricata, and Snort, offer a variety of detection features catered to various network security requirements.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{169699,
        author = {Nishant Kumar and Prakashraj and Himanshu pathak and Prince kumar and Divyam Gandhi and neetu bala},
        title = {NETWORK INTRUSION DETECTION SYSTEM},
        journal = {International Journal of Innovative Research in Technology},
        year = {2024},
        volume = {11},
        number = {6},
        pages = {2084-2089},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=169699},
        abstract = {An important cybersecurity tool for keeping an eye on network traffic for questionable activity and possible dangers like hostile assaults or unauthorized access is a network intrusion detection system, or NIDS. NIDS finds abnormalities that might point to an intrusion attempt by examining traffic patterns and contrasting them with baselines of typical activity or known indicators of malicious activity. Typically, this system includes a management console to notify network administrators, sensors to collect data, and analyzers for processing. Although NIDS improves network security by facilitating real-time monitoring and response, it has drawbacks such as high false positive rates, managing encrypted traffic, and thwarting attackers' evasion techniques. Popular NIDS tools, such as Zeek, Suricata, and Snort, offer a variety of detection features catered to various network security requirements.},
        keywords = {Network security, Intrusion Detection, Anomaly Detection, Signature -Based Detection, Traffic monitoring .},
        month = {November},
        }

Cite This Article

Kumar, N., & Prakashraj, , & pathak, H., & kumar, P., & Gandhi, D., & bala, N. (2024). NETWORK INTRUSION DETECTION SYSTEM. International Journal of Innovative Research in Technology (IJIRT), 11(6), 2084–2089.

Related Articles