CFP last date
20 December 2024
Reseach Article

Threat Mitigation Strategy in Information System using Intrusion Detection System: A General Classification Reviews

by Muheet Ahmed Butt, Qamar Rayees Khan, Mohammad Asger, Majid Zaman
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 10
Year of Publication: 2015
Authors: Muheet Ahmed Butt, Qamar Rayees Khan, Mohammad Asger, Majid Zaman
10.5120/20185-2406

Muheet Ahmed Butt, Qamar Rayees Khan, Mohammad Asger, Majid Zaman . Threat Mitigation Strategy in Information System using Intrusion Detection System: A General Classification Reviews. International Journal of Computer Applications. 115, 10 ( April 2015), 4-8. DOI=10.5120/20185-2406

@article{ 10.5120/20185-2406,
author = { Muheet Ahmed Butt, Qamar Rayees Khan, Mohammad Asger, Majid Zaman },
title = { Threat Mitigation Strategy in Information System using Intrusion Detection System: A General Classification Reviews },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 10 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number10/20185-2406/ },
doi = { 10.5120/20185-2406 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:26.097859+05:30
%A Muheet Ahmed Butt
%A Qamar Rayees Khan
%A Mohammad Asger
%A Majid Zaman
%T Threat Mitigation Strategy in Information System using Intrusion Detection System: A General Classification Reviews
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 10
%P 4-8
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The information security as a term starts its impact when the computers dominated the market. As the computer system becomes more and more affordable security problems and solutions were phrased. Before the mid 1980 till date, the Information Security concerns of any organizations has also increases many fold. Majority of the organizations either big or small are facing an increasing number of threats every day in the form of viruses and attacks etc, that compromise the Integrity of the Information System. Since then many different mechanisms were opted by organizations like intrusion detection to protect their organizations from these kinds of threats/ attacks. In this paper we try to highlight the impact of Threat on the information system and corresponding mitigating strategy like IDS. This paper will mainly focus on classification of Intrusion Detection Systems.

References
  1. Michael E. Whitman, Herbert J. Mattord. (2012), Principles of Information Security, CENGAGE Learning, fourth edition.
  2. D. W. Straub, W. D. Nance. (1990), Discovering and disciplining computer abuse in organization: a field study, MIS Quarterly ,pp. 45–55.
  3. T. R. Peltier. (2001), Information Security Risk Analysis, Auerbach,New York.
  4. D. Icove, K. Seger, W. Vonstorch, Computer Crime. (1999), A Crimefighter's Handbook, O'Reilly & Associates, Inc.
  5. Quey-Jen Yeh a,*, Arthur Jung-Ting Chang. (2007), Threats and countermeasures for information system security: A cross-industry study, Elsevier, Information & Management 44, pp- 480–491.
  6. K. D. Loch, H. H. Carr, M. E. Warkentin. (1992), Threats to information systems: today's reality, yesterday's understanding, MIS Quarterly 16 (2), pp. 173–186.
  7. CNSS, National Information Assurance (IA) Glossary (CNSS Instruction No. 4009), Committee on National Security Systems, revised in June 2006, http://www. cnss. gov/instructions. html, (cited July 5, 2006).
  8. A. Kankanhalli, H. H. Teo, B. C. Y. Tan, K. K. Wei. (2003), An integrative study of information systems security effectiveness, International Journal of Information Management, pp. 139–154.
  9. Bernard Menezes (2011) , Network Security and Cryptography, CENGAGE Learning.
  10. Beigh, B. M. , & Peer, M. A. (2012). Intrusion Detection and Prevention System: Classification and Quick, ARPN Journal of Science and Technology, VOL. 2, NO. 7, ISSN 2225-7217.
  11. Mitchell D'silva, Deepali Vora. (2013), Comparative Study of Data Mining Techniques to Enhance Intrusion Detection, Inter. Jour. of Engineering Research and Applications (IJERA), Vol. 3, Issue 1 , pp. 1267-1275 , ISSN: 2248-9622.
  12. Butt, Muheet Ahmed, and Majid Zaman. "Assessment Model based Data Warehouse: A Qualitative Approach. " International Journal of Computer Applications 62. 10 (2013).
  13. Butt, Muheet Ahmed, and Majid Zaman. "Assessment Model based Data Warehouse: A Qualitative Approach. " International Journal of Computer Applications 62. 10 (2013).
  14. Zaman, Majid, and Muheet Ahmed Butt. "Enterprise Data Backup & Recovery: A Generic Approach. " International Organization of Scientific Research Journal of Engineering (IOSRJEN) (2013): 2278-4721.
  15. MaqboolRao, Nouman, et al. "Distributed Data Warehouse Architecture: An Efficient Priority Allocation Mechanism for Query Formulation. "
  16. Butt, Muheet Ahmed. "COGNITIVE RADIO NETWORK: SECURITY ENHANCEMENTS. " Journal of Global Research in Computer Science 4. 2 (2013): 36-41.
  17. Butt, M. A. , and M. Zaman. "Data Quality Tools for Data Warehousing: Enterprise Case Study. " IOSR Journal of Engineering 3. 1 (2013): 75-76.
  18. Khan, Sajad Mohammad, Muheet Ahmed Butt, and Majid Zaman Baba. "Information Communication Technology: Practices for Academia. "
Index Terms

Computer Science
Information Sciences

Keywords

Information Security Threats Viruses attacks Intrusion detection system.