A Survey on IPS Methods and Techniques
The quality and impact of attacks have been continuously increases; attackers continuously find vulnerabilities at various levels, from the network itself to operating system and applications, exploit to crack the system and services. Defence system and networking monitoring has becomes essential
component of computer security to predict and present attacks. IPS can be termed as the extension of IDS with exercise of access control to protect computers from exploitation. IPS is an
intelligent device that is capable of not only detecting malicious activities, but also to take preventive actions to secure both the host and the network attacks. An IPS works inline in the data stream to provide protection from malicious attacks in real time.
This is called inline mode. In this paper the deeper analysis is the
IPS identify, stop and block attacks that would normally pass through a traditional fire wall devices.
Keywords: IPS, firewall, Signature detection, Stateful Protocol, IP TTL, Security System
Download Full-Text
ABOUT THE AUTHORS
K. Prabha
Department of computer science, Assistant Professor.
S. Sudha Sree
Department of computer science, Research Scholar.
K. Prabha
Department of computer science, Assistant Professor.
S. Sudha Sree
Department of computer science, Research Scholar.