A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Comparative Analysis of Intrusion Detection Methods
2012
Bezopasnostʹ Informacionnyh Tehnologij
This paper tells about existing methods of intrusion detection. The paper contains comprehensive com parative analysis of these methods. In this paper advantages and disadvantages of methods are identified. The preferred method to ensure the protection of distributed data processing systems is estimated.
doaj:e9758d516f1d49e694dc4236d8b92a6c
fatcat:wu3mnf5herehfaxvalluz4amfm