Developing an Algorithm to Implement Efficient Intrusion Detection System using Soft Computing
A. S. Zadgaonkar1, Pooja Agrawal2, Anju Lata Rathore3
1Dr. A.S. Zadgaonkar, Vice Chancellor, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.), India.
2Pooja Agrawal, Assistant Professor, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, India.
3Anju Lata Rathore, Research Scholar, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.), India.
Manuscript received on May 05, 2013. | Revised Manuscript received on May 11, 2013. | Manuscript published on May 15, 2013. | PP: 35-39 | Volume-1 Issue-6, May 2013. | Retrieval Number: F0298051613/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: During last decades information technologies based on the computer networks play an important role in various spheres of human activity. Information has become the organizations most precious asset. Organizations have become increasingly dependent on the information since more information is being stored and processed on network-based systems. The widespread use of e-commerce has increased the necessity of protecting the system to a very high extent. Problems of great importance are entrusted on them, such as keeping, transmission and automation of information processing. The security level of processed information can vary from private and commercial to military and state secret.
Keywords: Information, Organizations, Commercial, Security, Internet, Automation.