IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 5, May 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Introduction To Intrusion Detection System: Review

[Full Text]

 

AUTHOR(S)

Rajni Tewatia, Asha Mishra

 

KEYWORDS

Index Terms: Intrusion Detection system (IDS), Attack, Data, False alarm, Intruder, Network, Approach.

 

ABSTRACT

Abstract: Security of a network is always an important issue. With the continuously growing network, the basic security such as firewall, virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks, we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network, Clustering, Pattern Matching, Rule Based, Fuzzy Logic, Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

 

REFERENCES

[1] Dorothy E. Denning “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, vol.SE-13, No.2, February 1987.

[2] Nawal A. Elfeshawy and Osama S. Faragallah “Divided two part adaptive intrusion detection system”, Published online: 13 June 2012 Springer Science+Business Media, LLC 2012.

[3] Shaik Akbar, Dr.K.Nageswara Rao, Dr.J.A.Chandula “Intrusion Detection System Methodologies Based on Data Analysis”, international Jouranal of Computer Application(0975-8887) Volume 5-no.2, August 2010.

[4] Alan Bivens, Chandrika Palagiri, Rasheda Smith, Boleslawszymanski, Mark Embrechts “Network-Based Intrusion Detection Using Neural Networks”, Proc. Intelligent Engineering Systems through Artificial Neural Networks ANNIE-2002, St. Louis, MO, vol. 12, ASME Press, New York, NY, 2002, pp. 579-584.

[5] Amit Kumar,Harish Chandra Maurya and Rahul Mishra “ A Research Paper on Hybrid Intrusion Detection System”, International Journal and Advanced Technology(IJEAT) ISSN:2249-8958, Volume-2, Issue-4, April 2013

[6] Ghorbani, AA, Lu, W, Travallaee, M, “Network Intrusion Detection and prevention Concepts and Techniques “Springer 2010, hardcover, ISBN:978-0-387-88770-8

[7] Sharddha Surna “Intrusion Detection using Fuzzy Clustering and Artificial Neural Network”, Advances in Neural Networks, Fuzzy Systems and Artificial Intelligence.

[8] Mostaque Md. Morshedur Hassan “Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic” International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 7, September 2013.

[9] Alan Bivens, Chandrika Palagiri, Rasheda Smith, Boleslawszymanski, Mark Embrechts “Network-Based Intrusion Detection Using Neural Networks” Proc. Intelligent Engineering Systems through Artificial Neural Networks ANNIE-2002, St. Louis, MO, vol. 12, ASME Press, New York, NY, 2002, pp. 579-584.