Archive
SCIENTIFIC WORK - 2025 SCIENTIFIC WORK - 2024 SCIENTIFIC WORK - 2023 SCIENTIFIC WORK - 2022 SCIENTIFIC WORK - 2021 SCIENTIFIC WORK - 2020 SCIENTIFIC WORK - 2019 SCIENTIFIC WORK - 2018 SCIENTIFIC WORK - 2017 SCIENTIFIC WORK - 2016 SCIENTIFIC WORK - 2015 SCIENTIFIC WORK - 2014 SCIENTIFIC WORK - 2013 SCIENTIFIC WORK - 2012 SCIENTIFIC WORK - 2011 SCIENTIFIC WORK - 2010 SCIENTIFIC WORK - 2009 SCIENTIFIC WORK - 2008 SCIENTIFIC WORK - 2007

DOI:  https://doi.org/10.36719/2663-4619/115/319-322

Sevil Hagverdiyeva

Azerbaijan State Agrarian University

https://orcid.org//0009-0000-1238-8338

sevil.haqverdiyeva@gmail.com

Anar Guliyev

Azerbaijan State Agrarian University

https://orcid.org//0009-0002-5549-4063

anar_guliyev74@mail.ru

Ulviyya Safarova

Azerbaijan State Agrarian University

https://orcid.org/0009-0004-1102-2114

ulviyaeldar@mail.ru

Sima Mammadova

Azerbaijan State Agrarian University

https://orcid.org/0009-0006-5163-3598

simamemmedova9642@gmailcom

 

IDS (Intrusion Detection System) Security System in

Corporate Networks

 

Abstract

 

Security technology is developing rapidly with the rapid increase in the number and types of security-related threats. In order to ensure network security and prevent unauthorized persons from entering the system and capturing or changing data, identification and access control security mechanisms were first developed. However, even a system with very good access control and identification has some weaknesses. Identification and access control constitute the first layer of security defense. Due to the increase in threats, new mechanisms are needed in addition to the mechanisms we have listed. Mechanisms such as firewall, VS (Vulnerability Scanner), IDS provide a second layer of defense for the network. Each of the security mechanisms we have mentioned is not sufficient for security separately. According to the security architecture of the corporation, for a secure system, these tools should be used in a way that supports each other.

IDS is a system that monitors legal and illegal processes. This system collects and analyzes all information related to both internal and external sessions. If any illegal situation is detected, it warns you through various means. It has taken its place in the corporate network architecture as an additional tool for network administrators. It checks and analyzes the activity of all internal and external networks. It is able to reveal all suspicious cases - system intrusion and other similar cases.

Keywords: Corporate network, security, identification, threats, defense system

 

Views: 99