Abstract | ||
---|---|---|
To defend a network from intrusion is a generic problem of all time. It is important to develop a defense mechanism to secure the network from anomalous activities. This paper presents a comprehensive survey of methods and systems introduced by researchers in the past two decades to protect network resources from intrusion. A detailed pros and cons analysis of these methods and systems is also reported in this paper. Further, this paper also provides a list of issues and research challenges in this evolving field of research. We believe that this knowledge will help to create a defense system. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1016/j.jnca.2015.07.011 | Journal of Network and Computer Applications |
Keywords | DocType | Volume |
DoS,Intrusion,Defense,Response,Tolerance | Journal | 57 |
ISSN | Citations | PageRank |
1084-8045 | 1 | 0.40 |
References | Authors | |
30 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Rup Kumar Deka | 1 | 4 | 1.48 |
Kausthav Pratim Kalita | 2 | 1 | 0.40 |
D. K. Bhattacharya | 3 | 1 | 0.40 |
Jugal K. Kalita | 4 | 856 | 62.32 |