Bilal Maqbool Beigh

Work place: Department of Computer Science, University of Kashmir, Srinagar, India

E-mail: bilal.beigh@gmail.com

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Information Security, Intrusion Detection System

Biography

Bilal Maqbool Beigh was born in 1985. Bilal is Ph. D. candidate in Department of computer science, University of Kashmir, Srinagar, India. He completed his bachelor’s in computer science and application from Shri Pratap College, M.A.Road Srinagar J&k, He completed his Master degree from University of Pune in 2009. He did his M.Phil in computer sciences and application from University of Kashmir in 2012. The area of interest is information security and intrusion detection systems. The author has published more than 15 papers in different national and international Journals and conferences.

Author Articles
A New Classification Scheme for Intrusion Detection Systems

By Bilal Maqbool Beigh

DOI: https://doi.org/10.5815/ijcnis.2014.08.08, Pub. Date: 8 Jul. 2014

In today’s world, overall global mostly depend on technologies for their information storage and transactions. But this frequent use of online technologies make the data stored exposed to the risk of attacks towards the data in the form of intrusion. In order to save our data from these attacks, the researchers had implemented a concept called intrusion detection system, with the help of detection technology the users can prevent their critical data from different kind of attacks. As we know that there are lots of intrusion detection system in market which are either open source and some of them are commercial. Although the number is very high but there is no such classification available in research literature which will help user or security professionals. In this paper we will present a good and elaborated classification based on various parameters which will help the researchers and security professional to understand the category. The paper will also provide a brief detail of those categories which will give idea of representing the intrusion detection techniques.

[...] Read more.
Other Articles