Research Article

Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection

Table 1

The comparison of current IDS policy.

TitleTypeCharacteristicsLimitations

 Integral structureIntegrates all functionsWeak on system prevention
IDSHierarchal structureShares information of all subsystemsSingle-point failure
 Distributed structureCombination of individual sensorsData communications are too large and complex