Skip navigation
Please use this identifier to cite or link to this item: https://repository.esi-sba.dz/jspui/handle/123456789/50
Full metadata record
DC FieldValueLanguage
dc.contributor.authorATTATFA, ABdelghani-
dc.contributor.authorCHELOUF, SOufyane-
dc.date.accessioned2022-03-28T13:06:10Z-
dc.date.available2022-03-28T13:06:10Z-
dc.date.issued2020-
dc.identifier.urihttps://repository.esi-sba.dz/jspui/handle/123456789/50-
dc.descriptionM Kechar Mohamed Encadreuren_US
dc.description.abstractWith the huge rise of the internet and the notable technological development in recent years, the number of users has greatly increased. The internet serves countless personal and professional needs for people and companies. However, this interconnection of computers also allows attackers and malicious users to exploit these resources for malicious purposes, which exposes today’s computer networks to an increasing number of attacks and threats security, with new types of techniques and attacks appearing continuously and which are increasing both in number, severity and impact. For these reasons, researchers and systems administrators seek effective and automated security strategies and solutions in order to reduce damage or stop a big part of threats able to protect the corporate network and information systems. One of the best solution in this context are Intrusion Detection Systems (IDS), which are used for protecting computer networks and information systems.en_US
dc.language.isoenen_US
dc.titleIntrusion Detection Systems: Study and Comparisonen_US
dc.typeThesisen_US
Appears in Collections:Master

Files in This Item:
File Description SizeFormat 
Memoire de master IDS.pdf747,58 kBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.