DC Field | Value | Language |
dc.contributor.author | ATTATFA, ABdelghani | - |
dc.contributor.author | CHELOUF, SOufyane | - |
dc.date.accessioned | 2022-03-28T13:06:10Z | - |
dc.date.available | 2022-03-28T13:06:10Z | - |
dc.date.issued | 2020 | - |
dc.identifier.uri | https://repository.esi-sba.dz/jspui/handle/123456789/50 | - |
dc.description | M Kechar Mohamed Encadreur | en_US |
dc.description.abstract | With the huge rise of the internet and the notable technological development in
recent years, the number of users has greatly increased. The internet serves countless
personal and professional needs for people and companies. However, this interconnection
of computers also allows attackers and malicious users to exploit these
resources for malicious purposes, which exposes today’s computer networks to an
increasing number of attacks and threats security, with new types of techniques and
attacks appearing continuously and which are increasing both in number, severity
and impact. For these reasons, researchers and systems administrators seek effective
and automated security strategies and solutions in order to reduce damage or stop a
big part of threats able to protect the corporate network and information systems.
One of the best solution in this context are Intrusion Detection Systems (IDS),
which are used for protecting computer networks and information systems. | en_US |
dc.language.iso | en | en_US |
dc.title | Intrusion Detection Systems: Study and Comparison | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Master
|