International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 115 - Issue 10 |
Published: April 2015 |
Authors: Muheet Ahmed Butt, Qamar Rayees Khan, Mohammad Asger, Majid Zaman |
![]() |
Muheet Ahmed Butt, Qamar Rayees Khan, Mohammad Asger, Majid Zaman . Threat Mitigation Strategy in Information System using Intrusion Detection System: A General Classification Reviews. International Journal of Computer Applications. 115, 10 (April 2015), 4-8. DOI=10.5120/20185-2406
@article{ 10.5120/20185-2406, author = { Muheet Ahmed Butt,Qamar Rayees Khan,Mohammad Asger,Majid Zaman }, title = { Threat Mitigation Strategy in Information System using Intrusion Detection System: A General Classification Reviews }, journal = { International Journal of Computer Applications }, year = { 2015 }, volume = { 115 }, number = { 10 }, pages = { 4-8 }, doi = { 10.5120/20185-2406 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2015 %A Muheet Ahmed Butt %A Qamar Rayees Khan %A Mohammad Asger %A Majid Zaman %T Threat Mitigation Strategy in Information System using Intrusion Detection System: A General Classification Reviews%T %J International Journal of Computer Applications %V 115 %N 10 %P 4-8 %R 10.5120/20185-2406 %I Foundation of Computer Science (FCS), NY, USA
The information security as a term starts its impact when the computers dominated the market. As the computer system becomes more and more affordable security problems and solutions were phrased. Before the mid 1980 till date, the Information Security concerns of any organizations has also increases many fold. Majority of the organizations either big or small are facing an increasing number of threats every day in the form of viruses and attacks etc, that compromise the Integrity of the Information System. Since then many different mechanisms were opted by organizations like intrusion detection to protect their organizations from these kinds of threats/ attacks. In this paper we try to highlight the impact of Threat on the information system and corresponding mitigating strategy like IDS. This paper will mainly focus on classification of Intrusion Detection Systems.