Open Access Open Access  Restricted Access Subscription Access

Intrusion Detection Systems: A Review

Akshay Vashistha

Abstract


In this paper, we present an overview of existing intrusion detection techniques. All these algorithms are described more or less on their own. Intrusion detection system is a very popular and computationally expensive task. We also explain the fundamentals of intrusion detection system. We describe today’s approaches for intrusion detection system. From the broad variety of efficient techniques that have been developed we will compare the most important ones. We will systematize the techniques and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected.

Cite this Article
Akshay Vashistha. Intrusion Detection Systems: A Review. Journal of Advances in Shell Programming. 2015; 2(1): 11–13p.


Keywords


Star state intrusion detection system, SOM, information mining

Full Text:

PDF

References


Litty Lionel. Hypervisor-Based Intrusion Detectio. Master of Science Graduate Department of Computer Science University of Torronto. 2005.

Mark Crosbie, Gene Spafford. Active Defence of a Computer System using Anonymous Agents. Technical Report 95-008, COAST Group, Department of Computer Science, Purdue University, West Lafayette, Indiana. Feb 1995.

Litty. Intrusion Detection. Http://www.cs.torronto.edu/~litty/papers/MS.pdf.

Christos Douligeris, Dimitrios Nikolaou Serpanos. Network Security. 93p.

Anderson JP. Computer Security Threat Monitoring & Surveilance. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania. 1980.

Jake Ryan, Meng-Jang Lin, Risto Miikkulainen. Intrusion Detection with Neural Networks. Advances in Neural Information Processing System. 10, Cambridge, MA: MIT Press. 1998. DOI: 10.1.1.31.3570.

Denning DE. An Intrusion Detection Model. IEEE Trans. Softw. Eng. Communication Magazine. 1987; SE-13: 222-232p. DOI: 10.1109/TSE.1987.232894.

Teng HS, Chen K, Lu SC. Adaptive Real-Time Anomaly Detection using Inductively Generated Sequential Patterns. Proceedings of Symposium on research in Computer Security & Privacy, IEEE Communication Magazine. 1990; 278–284p.

Sekeh MA, Bin Maarof MA. Fuzzy Intrusion Detection System via Data Mining with Sequence of System Calls. Proceedings of International Conference on Information Assurance & security (IAS) 2009, IEEE Communication Magazine. 2004; 154p-Applications, 1–15p.

Shilendra Kumar Shrivastava, Preeti Jain. Effective Anomaly Based Intrusion Detection Using Rough Set Theory & Support Vector Machine (0975-8887), Mar 2011; 18(3). DOI: 10.5120/2261-2906.

Aly Ei-Semary, Janica Edmonds, Jesus Gonzalez-Pino, et al. Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection. Proceedings of Workshop on Information Assurance United States Military Academy 2006, IEEE Communication Magazine, West Point, NY. DOI: 10.1109/ IAW.2006/ 652083.

Taeshik Shon, Jong Sub Moon. A Hybrid Machine Learning Approach to Network Anomaly Detection. Information Sciences. 2007; 177(18): 3799-3821p. USENIX Association. ISSN: 00200255, DOI:10.1016/j.ins-2007.03.025.

Sadiq Ali Khan. Rule-Based Network Intrusion Detection Using Genetic Algorithm. International Journal of Computer Applications. 2011; 8. Article: 6, DOI: 10.5120/2303-2914.

Norouzian MR, Merati S. Classifying Attacks in a Network Intrusion Detection System Based on Artificial Neural Networks. Proceedings of 13th International Conference on Advanced Communication Technology (ICACT). 2011; 868–873p. ISBN: 978-1-4244-8830-8.

Jin-Ling Zhao, Jiu-fen Zhao, Jian-Jun Li. Intrusion Detection Based on Clustering Genetic Algorithm. Proceedings of International Conference on Machine Learning & Cybernetics (ICML). IEEE Communication Magazine. 2005. ISBN:0-7803 9091 1,DOI: 10.1109/ICML.2005.1527621.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/