Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
459448 | Journal of Network and Computer Applications | 2015 | 14 Pages |
Abstract
To defend a network from intrusion is a generic problem of all time. It is important to develop a defense mechanism to secure the network from anomalous activities. This paper presents a comprehensive survey of methods and systems introduced by researchers in the past two decades to protect network resources from intrusion. A detailed pros and cons analysis of these methods and systems is also reported in this paper. Further, this paper also provides a list of issues and research challenges in this evolving field of research. We believe that this knowledge will help to create a defense system.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Rup Kumar Deka, Kausthav Pratim Kalita, D.K. Bhattacharya, Jugal K. Kalita,