Open Access   Article Go Back

A Comprehensive Survey on Methods Implemented For Intruder Detection System

B. Kiranmai1 , A. Damodaram2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-8 , Page no. 70-73, Aug-2014

Online published on Aug 31, 2014

Copyright © B. Kiranmai, A. Damodaram . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Kiranmai, A. Damodaram, “A Comprehensive Survey on Methods Implemented For Intruder Detection System,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.70-73, 2014.

MLA Style Citation: B. Kiranmai, A. Damodaram "A Comprehensive Survey on Methods Implemented For Intruder Detection System." International Journal of Computer Sciences and Engineering 2.8 (2014): 70-73.

APA Style Citation: B. Kiranmai, A. Damodaram, (2014). A Comprehensive Survey on Methods Implemented For Intruder Detection System. International Journal of Computer Sciences and Engineering, 2(8), 70-73.

BibTex Style Citation:
@article{Kiranmai_2014,
author = {B. Kiranmai, A. Damodaram},
title = {A Comprehensive Survey on Methods Implemented For Intruder Detection System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2014},
volume = {2},
Issue = {8},
month = {8},
year = {2014},
issn = {2347-2693},
pages = {70-73},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=228},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=228
TI - A Comprehensive Survey on Methods Implemented For Intruder Detection System
T2 - International Journal of Computer Sciences and Engineering
AU - B. Kiranmai, A. Damodaram
PY - 2014
DA - 2014/08/31
PB - IJCSE, Indore, INDIA
SP - 70-73
IS - 8
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3439 3361 downloads 3511 downloads
  
  
           

Abstract

Intrusion recognition is the act of discovering undesirable visitors on a system or a system. An IDS can be a piece of set up software or a physical equipment that watches system visitors in order to identify undesirable action and activities such as unlawful and harmful visitors, visitors that goes against security plan, and visitors that goes against appropriate use policies. Intruder detection system can be implemented using various data mining approaches. This paper summarizes intrusion motives and some of the methods used and implemented for intrusion detection system. This paper also reviewed about processing environment and type of data required for evaluation of Intruder detection system.

Key-Words / Index Term

Intruder Detection System; Data Mining; Kddcup99

References

[1] Asmaa shaker,Ashroor 2011 International conference on Future Information Technology IPCSIT vol.13 (2011) � (2011) IACSIT Press, Singapore.
[2] Singh, S. and S. Kandula, �Argus - a distributed network-intrusion detection system,� Undergraduate Thesis, Indian Institute of Technology, May 2001.
[3] Jiawei Han and Micheline Kamber Data Mining Concepts and Techniques Second Edition Morgan Kauffman Publishers ,2006
[4] Shaik Akbar, Dr.K. Nageswara Rao, Dr.J.A. Chandulal IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.8, August 2011pp 138-144
[5] Mrutyunjaya Panda, Manas Ranjan Patra IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.12, December 2007 pp 258- 263
[6] P.Jenson, "Bayesian networks and decision graphs�, Springer, New-york, USA, 2001.
[7] Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung 0-7803-7278-6/02 �2002 IEEE
[8] Nani Yasmin1, Anto Satriyo Nugroho2, Harya Widiputra3,� Optimized Sampling with Clustering Approach for Large Intrusion Detection Data�, International Conference on Rural Information and Communication Technology 2009 Pp.56-60
[9] Yu Guan and Ali A. Ghorbani, Nabil Belacel,�Y-Mean: A Clustering method For Intrusion Detection�, 1CCECE 2003, pp.1-4
[10] Fangfei Weng, Qingshan Jiang, Liang Shi, and Nannan Wu,�An Intrusion Detection System Based on the Clustering Ensemble�, IEEE International workshop on 16-18 April 2007,pp.121 � 124
[11] Kusum kumara Bharati,Sanyam Shukla, Swetha Jain Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010], 3-5 August 2010
[12] Wenkee Lee, Salvatore J. Stolfo, Kui W. Mok c 2000 Kluwer Academic Publishers. Printed in Netherlands.
[13] Rahimeh Rouhi , Farshid Keynia, Mehran Amiri Journal of Computer Sciences and Applications, 2013, Vol. 1, No. 3, 33-38
[14] Shengi YiJiang,Xiaoyu Song, Hui Wang, Jian-Jun Han,Qing-Hua Li Science direct � 2005 Elsevier pp 802-810