Article Fingerprint
ReserarchID
CSTNWS110WO
The fact that swindlers can trick computer and mobile systems to commit different criminal offenses have to lead to the current advancement in the domain of Intrusion Detection Systems (IDSs). While the toolkits are growing mechanisms for monitoring, analyzing, gathering and reporting activities that can endanger computer and mobile systems, however, they are frequently subjected to series of fiery debates over the years. Thus, a wide range of taxonomy has been proposed to clarify their strengths and weaknesses. Nonetheless, researchers often reticent from critical issues associated with the “used alerts” and “unused alerts” that the toolkits can generate to warn analysts. Thus, this paper presents the progression of the above mechanisms over the years; and exhaustively explains some salient issues that were faulted in the previous reviews. Finally, we suggest various ways to improve the efficacy of the toolkits and how to lessen cases of intrusions across the globe.
Dr. Joshua Nehinbe. 2018. \u201cA Review of Technical Issues on IDS and Alerts\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 17 (GJCST Volume 17 Issue E5).
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 106
Country: Nigeria
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: Dr. Joshua Nehinbe (PhD/Dr. count: 1)
View Count (all-time): 333
Total Views (Real + Logic): 6359
Total Downloads (simulated): 1684
Publish Date: 2018 01, Fri
Monthly Totals (Real + Logic):
This study aims to comprehensively analyse the complex interplay between
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.