Introduction To Intrusion Detection System: Review
[Full Text]
AUTHOR(S)
Rajni Tewatia, Asha Mishra
KEYWORDS
Index Terms: Intrusion Detection system (IDS), Attack, Data, False alarm, Intruder, Network, Approach.
ABSTRACT
Abstract: Security of a network is always an important issue. With the continuously growing network, the basic security such as firewall, virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks, we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network, Clustering, Pattern Matching, Rule Based, Fuzzy Logic, Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.
REFERENCES
[1] Dorothy E. Denning “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, vol.SE-13, No.2, February 1987.
[2] Nawal A. Elfeshawy and Osama S. Faragallah “Divided two part adaptive intrusion detection system”, Published online: 13 June 2012 Springer Science+Business Media, LLC 2012.
[3] Shaik Akbar, Dr.K.Nageswara Rao, Dr.J.A.Chandula “Intrusion Detection System Methodologies Based on Data Analysis”, international Jouranal of Computer Application(0975-8887) Volume 5-no.2, August 2010.
[4] Alan Bivens, Chandrika Palagiri, Rasheda Smith, Boleslawszymanski, Mark Embrechts “Network-Based Intrusion Detection Using Neural Networks”, Proc. Intelligent Engineering Systems through Artificial Neural Networks ANNIE-2002, St. Louis, MO, vol. 12, ASME Press, New York, NY, 2002, pp. 579-584.
[5] Amit Kumar,Harish Chandra Maurya and Rahul Mishra “ A Research Paper on Hybrid Intrusion Detection System”, International Journal and Advanced Technology(IJEAT) ISSN:2249-8958, Volume-2, Issue-4, April 2013
[6] Ghorbani, AA, Lu, W, Travallaee, M, “Network Intrusion Detection and prevention Concepts and Techniques “Springer 2010, hardcover, ISBN:978-0-387-88770-8
[7] Sharddha Surna “Intrusion Detection using Fuzzy Clustering and Artificial Neural Network”, Advances in Neural Networks, Fuzzy Systems and Artificial Intelligence.
[8] Mostaque Md. Morshedur Hassan “Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic” International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 7, September 2013.
[9] Alan Bivens, Chandrika Palagiri, Rasheda Smith, Boleslawszymanski, Mark Embrechts “Network-Based Intrusion Detection Using Neural Networks” Proc. Intelligent Engineering Systems through Artificial Neural Networks ANNIE-2002, St. Louis, MO, vol. 12, ASME Press, New York, NY, 2002, pp. 579-584.
|