Also, there are different evils associated to these network structures. For instance, personal information theft, business information hacking and virus attacks are the contemporary issues businesses are facing nowadays in the network communication and data transfer areas (Frederick, 2002). Furthermore, because of the increasing amount of intrusions the local networks and Internet have turned out to be uncertain, therefore, businesses more and more applying a variety of systems that monitor information technology security breaches (Sans, 2009).
Network intrusion as its name represents, attempts to recognize attempted or applied intrusions into network and to carry out proper actions for the intrusions. Intrusion detection includes an extensive collection of methods that differ on several axes. A few of these axes comprise: (Silberschatz, Galvin, & Gagne, 2004)
The types of input inspected to identify intrusive action. These could comprise user shell commands, process system calls, as well as network packet headers or contents. Several types of intrusions might be identified only by correlating information from various such sources.
The variety of action capabilities. Basic and straightforward types of actions consist of changing an administrator of the possible intrusion or in some way halting the potentially intrusive action, for instance, killing a course of action engaged in actually intrusive activity. In a complicated type of action, a system might clearly redirect an intruder’s action to a trap. A false resource exposed to the attacker with the aim of observing and gaining information about the attack; to the attacker, the resource appears real.
These levels of freedom in the design of space for detecting intrusions in systems have brought an extensive variety of solutions acknowledged as intrusions detection systems (IDS) (Silberschatz, Galvin, & Gagne, 2004).
Gem Infosys desires to protect