Open Access   Article Go Back

A Survey on Robust Intrusion Detection System Methodology and Features

Jhalak Jain1 , Chetan Agarwal2 , Himanshu Yadav3

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 754-760, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.754760

Online published on Oct 31, 2018

Copyright © Jhalak Jain, Chetan Agarwal, Himanshu Yadav . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jhalak Jain, Chetan Agarwal, Himanshu Yadav, “A Survey on Robust Intrusion Detection System Methodology and Features,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.754-760, 2018.

MLA Style Citation: Jhalak Jain, Chetan Agarwal, Himanshu Yadav "A Survey on Robust Intrusion Detection System Methodology and Features." International Journal of Computer Sciences and Engineering 6.10 (2018): 754-760.

APA Style Citation: Jhalak Jain, Chetan Agarwal, Himanshu Yadav, (2018). A Survey on Robust Intrusion Detection System Methodology and Features. International Journal of Computer Sciences and Engineering, 6(10), 754-760.

BibTex Style Citation:
@article{Jain_2018,
author = {Jhalak Jain, Chetan Agarwal, Himanshu Yadav},
title = {A Survey on Robust Intrusion Detection System Methodology and Features},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {754-760},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3094},
doi = {https://doi.org/10.26438/ijcse/v6i10.754760}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.754760}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3094
TI - A Survey on Robust Intrusion Detection System Methodology and Features
T2 - International Journal of Computer Sciences and Engineering
AU - Jhalak Jain, Chetan Agarwal, Himanshu Yadav
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 754-760
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
573 272 downloads 232 downloads
  
  
           

Abstract

To enhance organize security diverse advances has been taken as size and significance of the system has builds step by step. Keeping in mind the end goal to discover interruption in the system Intrusion recognition frameworks were developed which were comprehensively arrange into two category first was misused based and other was anomaly based. In this paper review was done on the different methods of intrusion recognition framework where some of administered and unsupervised interruption location procedures were informed in detail. Here technique of different researcher are clarified with there ventures of working. Diverse kinds of attacks done by the interlopers were additionally surveyed.

Key-Words / Index Term

Anomaly Detection, ANN, Clustering, Genetic Algorithm, Intrusion Detection

References

[1]. Shaohua Teng, Naiqi Wu, Senior, Haibin Zhu, Senior, Luyao Teng, And Wei Zhang. “SVM-DT-Based Adaptive And Collaborative Intrusion Detection”. IEEE/CAA JOURNAL OF AUTOMATICA SINICA, VOL. 5, NO. 1, JANUARY 2018.
[2]. Aljurayban, N.S Emam, A. (21-23 March 2015). Framework For Cloud Intrusion Detection System Service. Web Applications And Networking (WSWAN), 2015 2nd World Symposium On, P1-5
[3]. Mr Mohit Tiwari,Raj Kumar, Akash Bharti, Jai Kishan. “Intrusion Detection System”. International Journal Of Technical Research And Applications E-ISSN: 2320-8163, Volume 5, Issue 2 (March - April 2017), PP. 38-44.
[4]. YU-XIN MENG,” The Practice On Using Machine Learning For Network Anomaly Intrusion Detection” Department Of Computer Science, City University Of Hong Kong, Kowloon, Hong Kong, 978-1-4577-0308-9/11/$26.00 ©2011 IEEE
[5]. Kai Peng, Victor C.M. Leung, Qingjia Huang. “Clustering Approach Based On Mini Batch Kmeans For Intrusion Detection System Over Big Data”. IEEE Transaction 2169-3536 © 2017. .
[6]. Chuanlong Yin , Yuefei Zhu, Jinlong Fei, And Xinzheng He. “A Deep Learning Approach For Intrusion Detection Using Recurrent Neural Networks” Current Version November 7, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2762418.
[7]. Mohammadreza Ektefa, Sara Memar, Fatimah Sidi, Lilly Suriani Affendey “Intrusion Detection Using Data Mining Techniques”, 978-1-4244-5651-2/10/$26.00 ©2010 IEEE
[8]. Premansu Sekhara Rath, 2manisha Mohanty, 3silva Acharya, 4monica Aich “Optimization Of Ids Algorithms Using Data Mining Technique” International Journal Of Industrial Electronics And Electrical Engineering, ISSN: 2347-6982 Volume-4, Issue-3, Mar.-2016
[9]. Liu Hui, CAO Yonghui “Research Intrusion Detection Techniques From The Perspective Ofmachine Learning” 2010 Second International Conference On Multimedia And Information Technology 978-0-7695-4008-5/10 $26.00 © 2010 IEEE
[10]. Barolli Leonard, Elmazi, Donald; Ishitaki, Oda, Tetsuya; Taro; Yi Liu, Uchida, Kazunori. (24-27 March 2015). Application Of Neural Networks For Intrusion Detection In Tor Networks. Advanced Information Networking And Applications Workshops (WAINA), 2015 IEEE 29th International Conference On, P67-72.
[11]. Zhiyuan Tan, Aruna Jamdagni, Xiangjian, Priyadarsi Nanda, Ren Ping Liu, “A System For Denial-Of-Service Attack Detection Based On Multi- Variate Correlation Analysis”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL:25 NO:2 YEAR 2014.
[12]. Mario Guimaraes, Meg Murray. Overview Of Intrusion Detection And Intrusion Prevention, Information Security Curriculum Development Conference By ACM (2008).
[13]. Koushal Kumar, Jaspreet Singh Batth “Network Intrusion Detection With Feature Selection Techniques Using Machine-Learning Algorithms” International Journal Of Computer Applications (0975 – 8887) Volume 150 – No.12, September 2016.
[14]. Muhammad Awais Shibli, Sead Muftic. Intrusion Detection And Prevention System Using Secure Mobile Agents, IEEE International Conference On Security & Cryptography (2008).
[15]. David Wagner, Paolo Soto. Mimicry Attacks On Host Based Intrusion Detection Systems, 9th ACM Conference On Computer And Communications Security (2002).
[16]. Harley Kozushko. Intrusion Detection: Host-Based And Network-Based Intrusion Detection Systems, (2003).
[17]. Lin Tan, Timothy Sherwood. A High Throughput String Matching Architecture For Intrusion Detection And Prevention, Proceedings Of The 32nd Annual International Symposium On Computer Architecture (ISCA 2005).
[18]. Nouf Saleh Aljurayban, Ahmed Emam “Framework For Cloud Intrusion Detection System Service”. DOI: 10.1109/ WSWAN.2015. 7210298, IEEE, 20 August 2015.