Open Access   Article Go Back

Concentric Study on Intrusion Detection System Types Tools & Techniques

S. K. Tiwari1 , D. S. Pandey2 , V. Namdeo3

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 850-855, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.850855

Online published on Jul 31, 2018

Copyright © S. K. Tiwari, D. S. Pandey, V. Namdeo . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. K. Tiwari, D. S. Pandey, V. Namdeo, “Concentric Study on Intrusion Detection System Types Tools & Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.850-855, 2018.

MLA Style Citation: S. K. Tiwari, D. S. Pandey, V. Namdeo "Concentric Study on Intrusion Detection System Types Tools & Techniques." International Journal of Computer Sciences and Engineering 6.7 (2018): 850-855.

APA Style Citation: S. K. Tiwari, D. S. Pandey, V. Namdeo, (2018). Concentric Study on Intrusion Detection System Types Tools & Techniques. International Journal of Computer Sciences and Engineering, 6(7), 850-855.

BibTex Style Citation:
@article{Tiwari_2018,
author = {S. K. Tiwari, D. S. Pandey, V. Namdeo},
title = {Concentric Study on Intrusion Detection System Types Tools & Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {850-855},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2523},
doi = {https://doi.org/10.26438/ijcse/v6i7.850855}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.850855}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2523
TI - Concentric Study on Intrusion Detection System Types Tools & Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - S. K. Tiwari, D. S. Pandey, V. Namdeo
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 850-855
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
395 216 downloads 243 downloads
  
  
           

Abstract

It has become clear that increasing the diversity of types of network networks is becoming a major challenge. This leads to the need to expand the data and exchange more and more information. Intrusion Detection Systems (IDS) are designed to try to eliminate the unauthorized use of this method to detect abuse and misuse of computer systems. In response to the growing use and development of IDS, this would be the most important aspect. In this article, we identify a number of general technical optimizations of the IDS. This article provides methodological details, including intrusion strategies. This article also contains general information about IDS intruders and our work on motivation. This article mainly deals with different methods of optimization and classification. Here, different approaches are mentioned regarding intrusion detection systems.

Key-Words / Index Term

It has become clear that increasing the diversity of types of network networks is becoming a major challenge. This leads to the need to expand the data and exchange more and more information. Intrusion Detection Systems (IDS) are designed to try to eliminate the unauthorized use of this method to detect abuse and misuse of computer systems. In resp

References

[1] A.M. Riyad, M.S. Irfan Ahmed and R.L. Raheemaa Khan “Multi agent based intrusion detection architecture for the IDS adaptation over time”, Second International Conference on Electrical, Computer and Communication Technologies (ICECCT),IEEE,2017
[2] Sara Chadli,Mohamed Emharraf and Mohammed Saber "The design of an IDS architecture for MANET based on multi-agent" International Colloquium on Information Science and Technology (CiSt),IEEE,2014
[3] Okan Can "Mobile agent based intrusion detection system”, 22nd Signal Processing and Communications Applications Conference (SIU), 2014
[4] Wang Yu, Cheng, Xiaohui and Wang Sheng ,“Anomaly Network Detection Model Based on Mobile Agent”, IEEE,Third International Conference on Measuring Technology and Mechatronics Automation, 2011
[5] Jaydip Sen “An Agent-Based Intrusion Detection System for Local Area Networks” published in International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2, No. 2, August 2010 PP 128-140
[6] Mr. Suryawanshi G.R, Prof. Vanjale S.B “Mobile Agent for Distributed Intrusion detection System in Distributed System” Publication in" International Journal of Artificial Intelligence and Computational Research (IJAICR.) ", Jan-June 2010 . ISSN-0975-3974. PP 1-8.
[7] Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee*, Ronald A. Olsson, “A Methodology for Testing Intrusion Detection Systems”
[8] Ionita, I.; Ionita, L. “An agent-based approach for building an intrusion detection system” Published in Networking in Education and Research, 2013 RoEduNet International Conference 12th Edition 26-28 Sept. 2013
[9] Faizal, M.A., Mohd Zaki M., Shahrin Sahib, Robiah, Y., Siti Rahayu, S., and Asrul Hadi, Y. “Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System”, Second International Conference on Network Applications, Protocols and Services, IEEE, 2010.
[10] Jitendra S Rathore, Praneet Saurabh, Bhupendra Verma “AgentOuro: A Novelty Based Intrusion Detection and Prevention System” Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on 3-5 Nov. 2012
[11] Cuppen, F. & Miege, A. (2002). Alert Correlation in a Cooperative Intrusion Detection Framewok. In Proceeding of the 2002 IEEE Symposium on Security and Privacy. IEEE, 2002
[12] Cabrera, J.B.D., Ravichandran, B & Mehra R.K. (2000). Statistical Traffic Modelling for Network Intrusion Detection. In Proceeding of the IEEE Conference.
[13] Yeophantong, T, Pakdeepinit, P., Moemeng, P & Daengdej, J.,.Network Traffic Classification Using Dynamic State Classifier. In Proceeding of IEEE Conference, 2005
[14] Farah J., Mantaceur Z. & Mohamed BA. (2007). A Framework for an Adaptive Intrusion Detection System using Bayesion Network. Proceeding of the Intelligence and Security Informatics, IEEE, 2007
[15] Cabrera, J.B.D., Ravichandran, B & Mehra R.K. (2000). Statistical Traffic Modelling for Network Intrusion Detection. In Proceeding of the IEEE Conference.
[16] Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H. & Zhou, S. (2002). Spesification-based Anomaly Detection: A New Approach for Detecting Network Intrusions. In Proceeding of CCS ACM Conference.
[17] Xiao-Yuan Yang , Xuan-Wu Zhou , Ping Wei and Li-Xian Wei"Hybrid NIDS based on biological immunology", Proceedings of 2004 International Conference on Machine Learning and Cybernetics,2004
[18] Qiang Xue , Lin-Lin Guo and Ji-Zhou Sun"The design of a distributed network intrusion detection system IA-NIDS", Proceedings of the 2003 International Conference on Machine Learning and Cybernetics,2003
[19] Karl Levitt. (2002). Intrusion Detection: Current Capabilities and Future Direction. Proceeding of IEEE Conference of the 18th Annual Computer Security Application, IEEE, 2002.
[20] Anderson, J.P., 1980. Computer Security and Threat Monitoring Surveillance. Technical report at Co. Fort Washington Pennsylvania.
[21] David Geer, Behavior-Based Network Security Goes Mainstream, IEEE,14-17, march 2006
[22] Tiwari Nitin, S. R. Singh and P. G. Singh, Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS), International Science Congress Association , 51-56, July (2012).
[23] Karen Scarfone, Peter Mell, Guide to Intrusion detection and prevention systems (IDPS), NIST, 1 to 127, 2007.
[24] B. Santos Kumar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, 77 – 82, “Intrusion Detection System- Types and Prevention”.
[25] Volume 2, Issue 8, August 2012, “ An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols”.
[26] Giovanni Vigna William Robertson Vishal Kher Richard A. Kemmerer, “A Stateful Intrusion Detection System for World-Wide Web Servers”.
[27] C. Krügel, T. Toth, Applying Mobile Agent Technology to Intrusion Detection, ICSE Workshop on Software Engineering and Mobility, 2001
[28] Mukesh Sharma,Akhil Kaushik, Amit Sangwan Performance Analysis of Real Time Intrusion Detection and Prevention System using Snort.,IJERT, July – 2012
[29] Vaishali T.Deshmukh, Shubhangi Vaikole, Layered Crf A Model To Build More Accurate Intrusion Detection System, IJERT, 2012
[30] Bin Zeng , Lu Yao and ZhiChen Chen"A network intrusion detection system with the snooping agents",International Conference on Computer Application and System Modeling, 2010