Cyber Security And Network Intrusion Prevention System
In the last little years, the Internet has experienced volatile growth. the length of with the extensive development
of new up-and-coming good services, the amount and impact of attacks have been incessantly augments, attackers
incessantly find vulnerabilities at a diversity of levels, from the network itself to operating system and applications, develop
the to break system and services. Cyber sanctuary has materialized as an established obedience for computer systems and an
infrastructure with a focus on protection of precious in sequence keep on those systems from which adversaries, who want to
get, deceitful, injure, obliterate or forbid access to it. Several information security techniques are available today to protect
information systems against illegal use, duplication, modification, destruction and virus attacks. Defense system and system
monitoring has becomes essential constituent of computer security to predict and stop assaults. Different conventional
Intrusion Detection System (, Intrusion Prevention System has additional features to secure computer complex system. In
this paper, we are presenting mapping problem and challenges of Intrusion Prevention System dedicated in hybrid apparatus.
Throughout this paper, we reviewed the concept of mapping and challenges in IPS.
Keywords- Intrusion Prevention System, Security t, IPS, Mapping Problem.