A Review of Technical Issues on IDS and Alerts

Article ID

CSTNWS110WO

A Review of Technical Issues on IDS and Alerts

Dr. Joshua Nehinbe
Dr. Joshua Nehinbe Federal University
DOI

Abstract

The fact that swindlers can trick computer and mobile systems to commit different criminal offenses have to lead to the current advancement in the domain of Intrusion Detection Systems (IDSs). While the toolkits are growing mechanisms for monitoring, analyzing, gathering and reporting activities that can endanger computer and mobile systems, however, they are frequently subjected to series of fiery debates over the years. Thus, a wide range of taxonomy has been proposed to clarify their strengths and weaknesses. Nonetheless, researchers often reticent from critical issues associated with the �used alerts� and �unused alerts� that the toolkits can generate to warn analysts. Thus, this paper presents the progression of the above mechanisms over the years; and exhaustively explains some salient issues that were faulted in the previous reviews. Finally, we suggest various ways to improve the efficacy of the toolkits and how to lessen cases of intrusions across the globe.

A Review of Technical Issues on IDS and Alerts

The fact that swindlers can trick computer and mobile systems to commit different criminal offenses have to lead to the current advancement in the domain of Intrusion Detection Systems (IDSs). While the toolkits are growing mechanisms for monitoring, analyzing, gathering and reporting activities that can endanger computer and mobile systems, however, they are frequently subjected to series of fiery debates over the years. Thus, a wide range of taxonomy has been proposed to clarify their strengths and weaknesses. Nonetheless, researchers often reticent from critical issues associated with the �used alerts� and �unused alerts� that the toolkits can generate to warn analysts. Thus, this paper presents the progression of the above mechanisms over the years; and exhaustively explains some salient issues that were faulted in the previous reviews. Finally, we suggest various ways to improve the efficacy of the toolkits and how to lessen cases of intrusions across the globe.

Dr. Joshua Nehinbe
Dr. Joshua Nehinbe Federal University

No Figures found in article.

Dr. Joshua Nehinbe. 2018. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 17 (GJCST Volume 17 Issue E5): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 17 Issue E5
Pg. 55- 62
Classification
GJCST-E Classification: H.3.7
Keywords
Article Matrices
Total Views: 6242
Total Downloads: 1654
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Review of Technical Issues on IDS and Alerts

Dr. Joshua Nehinbe
Dr. Joshua Nehinbe Federal University

Research Journals