ATTACK DETECTION SYSTEMS

Main Article Content

Аннотация:

An intrusion detection system is a software or hardware tool designed to detect unauthorized access to or control of a computer system or network, mainly via the Internet. Today, there are several types of IDS that differ in their monitoring and analysis methods. Each approach has its own advantages and disadvantages. In addition, all approaches can be described from a general point of view.

Article Details

Как цитировать:

Ibragimova , M. ., & Xurramov , R. . (2022). ATTACK DETECTION SYSTEMS. Евразийский журнал академических исследований, 2(13), 845–847. извлечено от https://in-academy.uz/index.php/ejar/article/view/7608

Библиографические ссылки:

"Intrusion Detection Systems" Rebecca Bace1 and Peter Mell2

For an overview of ADS and their capabilities, see "Evaluating Intrusion Detection for System and Network Security Management" http://www.icsa.net/services/consortia/intrusion/intrusion.pdf.

"Intrusion Detection System Product Survey"

http://lib-www.lanl.gov/lapubs/00416750.pdf

NIST's ICAT Vulnerability Index allows you to search for information about specific vulnerabilities. It is located at: http://csrc.nist.gov/icat.

Information on computer attacks detected by ADSs can be found in the May 1999 ITL bulletin "Computer Attacks: What They Are and How to Protect Against Them".

http://www.nist.gov/itl/lab/bulletns/cslbull1.htm

Snort is a lightweight network intrusion detection system with a variety of functions for recording and analyzing traffic on IP networks. This freeware product is published under the terms of the GNU General Public License by the Free Software Foundation.

http://www.snort.org

Center for education and research in the field of information provision and security

At Purdue University (CERIAS) developed many widely used network security tools, including the first widely used vulnerability assessment tool, COPS, and the first widely used file integrity checker, Tripwire. CERIAS is a free tool repository for security managers with extensive ftp, including many attack detection and vulnerability assessment tools.

http://www.cerias.purdue.edu

7. SecurityFocus.com has web pages for detecting attacks

includes news, information, discussions and tools. found in

http://www.securityfocus.com

ENERGIYA SAMARADORLIGINI NAZORAT VA BOSHQARISHNING AXBOROT DASTURIY TA’MINOTI VA SMART QURILMALAR. A Abdumalikov, Y Anvar, B Doniyor