Open Access   Article Go Back

An Overview Of Intrusion Detection System Using Various Classification Concepts

K Shukla1 , R K Gupta2 , V. Namdeo3

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 672-675, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.672675

Online published on Nov 30, 2018

Copyright © K Shukla, R K Gupta, V. Namdeo . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K Shukla, R K Gupta, V. Namdeo, “An Overview Of Intrusion Detection System Using Various Classification Concepts,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.672-675, 2018.

MLA Style Citation: K Shukla, R K Gupta, V. Namdeo "An Overview Of Intrusion Detection System Using Various Classification Concepts." International Journal of Computer Sciences and Engineering 6.11 (2018): 672-675.

APA Style Citation: K Shukla, R K Gupta, V. Namdeo, (2018). An Overview Of Intrusion Detection System Using Various Classification Concepts. International Journal of Computer Sciences and Engineering, 6(11), 672-675.

BibTex Style Citation:
@article{Shukla_2018,
author = {K Shukla, R K Gupta, V. Namdeo},
title = {An Overview Of Intrusion Detection System Using Various Classification Concepts},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {672-675},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3223},
doi = {https://doi.org/10.26438/ijcse/v6i11.672675}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.672675}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3223
TI - An Overview Of Intrusion Detection System Using Various Classification Concepts
T2 - International Journal of Computer Sciences and Engineering
AU - K Shukla, R K Gupta, V. Namdeo
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 672-675
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
297 227 downloads 179 downloads
  
  
           

Abstract

As technological interconnection and digital communication schemes wide spreading, data accessing required to be kept in sharing environment and hence it will surely lead to compromise the data in many aspects. So to keep data secure and protected there are variety of techniques and tools also developed and Intrusion detection system (IDS) is one of them. IDS system conceptualized with identifying the intrusions in place of stopping the attacks. There are various techniques discussed here in context of signature and behavior based IDS. These IDS tools use different identification techniques to classify and identify the attacks and type of attacks. This paper includes different types IDS which has capability inclusion of identifying attacks like probe, DoS, R2L etc. It is also covering categorized descriptions of host based as well as network based hybrid intrusion detection systems.

Key-Words / Index Term

Attacks, Classification, Communication, Detection, DoS, Intrusion, R2L, Signature etc

References

[1] Roshan Kumar, Deepak SharmaHyINT: Signature-Anomaly Intrusion Detection System 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2018.
[2] A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS) IEEE 2017.
[3] Akash Garg ; Prachi Maheshwari,10th International Conference on Intelligent Systems and Control (ISCO), 2016.
[4] Chaimae Saadi ,Ensak-Morroco and Habiba Chaoui “Intrusion detection system based interaction on mobile agents and clust-density algorithm “IDS-AM-Clust”, International Colloquium on Information Science and Technology (CiSt),IEEE,2016.
[5] ShailendraSahu and B M Mehtre ,"Network Intrusion Detection System Using J48 Decision Tree," 2015 IEEE.
[6] Sara Chadli,Mohamed Emharraf and Mohammed Saber "The design of an IDS architecture for MANET based on multi-agent" International Colloquium on Information Science and Technology (CiSt),IEEE,2014.
[7] Difan Zhang, Linqiang Ge, Rommie Hardy, Authersi Yu, Hanlin Zhang and Robert Reschly, "On Effective Data Aggregation Techniques In Host-based Intrusion Detection in MANET," The 10th Annual IEEE CCNC- Green Communications and Computations Track 2013 IEEE.
[8] Jitendra S Rathore, Praneet Saurabh, Bhupendra Verma “AgentOuro: A Novelty Based Intrusion Detection and Prevention System” Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on 3-5 Nov. 2012.
[9] Akthar, F. and Hahne, C. Rapid Miner 5 Operator Reference, 2012.
[10] Bin Zeng , Lu Yao and ZhiChen Chen"A network intrusion detection system with the snooping agents",International Conference on Computer Application and System Modeling, 2010.
[11] Vera Marinova-Boncheva, “A Short Survey of Intrusion Detection Systems”, Problems of Engineering Cybernetics and Robotics, 2007.
[12] Khaled Labib, Computer security and intrusion detection, Crossroads, Volume 11, Issue 1, August 2004.
[13] Murthy, S.K. , Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey. Data Mining and Knowledge Discovery, 24, 1998.
[14] Aurobindo Sundaram, An Introduction to Intrusion Detection, Crossroads, Volume 2, Issue 4, Pages: 3 –7, 1996.
[15] Northcutt, S. “Network Intrusion Detection: An Analyst’s Handbook.” New Riders, Indianapolis 1999.