Open Access   Article Go Back

Comparative Study of Intrusion Detection System

M. Chowdhary1 , S. Suri2 , M. Bhutani3

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-4 , Page no. 197-200, Apr-2014

Online published on Apr 30, 2014

Copyright © M. Chowdhary, S. Suri, M. Bhutani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Chowdhary, S. Suri, M. Bhutani, “Comparative Study of Intrusion Detection System,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.197-200, 2014.

MLA Style Citation: M. Chowdhary, S. Suri, M. Bhutani "Comparative Study of Intrusion Detection System." International Journal of Computer Sciences and Engineering 2.4 (2014): 197-200.

APA Style Citation: M. Chowdhary, S. Suri, M. Bhutani, (2014). Comparative Study of Intrusion Detection System. International Journal of Computer Sciences and Engineering, 2(4), 197-200.

BibTex Style Citation:
@article{Chowdhary_2014,
author = {M. Chowdhary, S. Suri, M. Bhutani},
title = {Comparative Study of Intrusion Detection System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2014},
volume = {2},
Issue = {4},
month = {4},
year = {2014},
issn = {2347-2693},
pages = {197-200},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=138},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=138
TI - Comparative Study of Intrusion Detection System
T2 - International Journal of Computer Sciences and Engineering
AU - M. Chowdhary, S. Suri, M. Bhutani
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 197-200
IS - 4
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3592 3425 downloads 3479 downloads
  
  
           

Abstract

In past few decades, there has been rapid progress in internet based technology and application areas for computer networks have emerged. But number of attacks on network has increased dramatically due to which interest of researchers in the network intrusion detection has also increased. Intrusion detection is a type of security management system for computers and networks. An intrusion detection system gathers and analyzes information from various areas within computer or network to identify possible security breaches, which include both intrusion and misuse. Intrusion detection system also helps in detecting anomalies in network traffic. Intrusion Detection system follows a two-step process. The first procedures are host-based and are considered the passive component, these include: inspection of the system`s configuration files to detect inadvisable settings; inspection of the password files to detect inadvisable passwords; and inspection of other system areas to detect policy violations. The second procedures are network-based and are considered the active component: mechanisms are set in place to reenact known methods of attack and to record system responses. Aim of this research paper is to review current trends in intrusion detection system and analyze current problems that exist in this area. Some key features, attacks detected by different types of IDs are explained in this paper.

Key-Words / Index Term

Detection Methods , Intrusion Detection , Types Of Attacks, Mechanism

References

[1] N. Puketza, K. Zhang, M. Chung, B. Mukherjee and R. A. Olsson �A methodology for testing intrusion detection systems," Proc. IEEE Transactions on Software Engineering, vol. 22, pp. 719 -729, 1996.
[2] Amrita Anand and Brijesh Patel, �An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols�, Proc. Ijarcsse Volume2, August2012, pp.310-325.
[3] J. R. Winkler and W. J. Page�Intrusion and Anomaly Detection in Trusted Systems," Proc. Fifth Annual Computer Security Applications Conference, 1989.
[4] D. E. Denning "An intrusion-detection model," IEEE Trans. on Software Engg., vol. SE-13, pp.222 -232 1987
[5] F. Cuppens and A. Miege, "Alert Correlation in a Cooperative Intrusion Detection Framework," Proc. IEEE Symp. Security and Privacy, pp. 202-215, May 2002.
[6] R. Durst, T. Champion, B. Witten, E. Miller and L. Spagnuolo, "Addendum to Testing and Evaluating Computer Intrusion Detection Systems," Proc. Comm. ACM, vol. 42, no. 9, p. 15, Sept. 1999.
[7] R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham and M. Zissman, "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proc. DARPA Information Survivability Conf. and Exposition, vol. 2, pp. 12-26, Jan. 2000.
[8] Karmore, Preetee K.; Bodkhe, Sonali T, �A Survey on Intrusion in Ad Hoc Networks and its Detection Measures,� Proc. International Journal on Computer Science & Engineering, 2011, vol. 3, Issue 5, pp. 1896-1903.