Безопасность информационных технологий (Mar 2012)
Comparative Analysis of Intrusion Detection Methods
Abstract
This paper tells about existing methods of intrusion detection. The paper contains comprehensive com parative analysis of these methods. In this paper advantages and disadvantages of methods are identified. The preferred method to ensure the protection of distributed data processing systems is estimated.