Open Access   Article Go Back

Taxonomy of Intrusion Detection System –A Study

P. Kaliraj1 , B. Subramani2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 320-324, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.320324

Online published on Apr 30, 2019

Copyright © P. Kaliraj, B. Subramani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Kaliraj, B. Subramani, “Taxonomy of Intrusion Detection System –A Study,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.320-324, 2019.

MLA Style Citation: P. Kaliraj, B. Subramani "Taxonomy of Intrusion Detection System –A Study." International Journal of Computer Sciences and Engineering 7.4 (2019): 320-324.

APA Style Citation: P. Kaliraj, B. Subramani, (2019). Taxonomy of Intrusion Detection System –A Study. International Journal of Computer Sciences and Engineering, 7(4), 320-324.

BibTex Style Citation:
@article{Kaliraj_2019,
author = {P. Kaliraj, B. Subramani},
title = {Taxonomy of Intrusion Detection System –A Study},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {320-324},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4035},
doi = {https://doi.org/10.26438/ijcse/v7i4.320324}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.320324}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4035
TI - Taxonomy of Intrusion Detection System –A Study
T2 - International Journal of Computer Sciences and Engineering
AU - P. Kaliraj, B. Subramani
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 320-324
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
348 246 downloads 163 downloads
  
  
           

Abstract

An intrusion detection system is a computer system monitors network traffic for suspicious activity, now, Computer Network is essential to give a high-level security to protect highly sensitive data and information. Network Technology and Internet related Application sector plays a essential role in today’s trend. Many intrusion detection techniques, methods and algorithms help to detect these attacks, hackers use different types of attacks for getting the valuable information. Numbers of clients are being connected with the technology day by day. It`s being done hacked by junction or evil intruder. A very effective tool in this is Intrusion Detection System , which detects the attacks and analysis it to take proper decision against it. Intrusion Detection System has a great impact on cyber security and network vulnerability. Once the detection is scored, the initialed can be taken by IDS. Intrusion detection system is a software and hardware device. This paper will notify us overview of IDS and to create a secure zone in the sector of networking. Numerous intrusion detection techniques, methods and algorithms assist to detect these attacks. Furthermore, appropriate problems and challenges in this field are consequently illustrated and discussed.

Key-Words / Index Term

Security, Intrusion detection, Network Attacks, Prevention System, Analyzer, Dos, Misuse detection, Anomaly detection

References

[1] The Rebecca Bace, Peter Mell, “NIST Special Publication on Intrusion Detection Systems”, 16 August 2001, pp.1-51.
[2] Defeng Wang, Yeung, D.S., and Tsang, E.C., “Weighted Mahalanobis Distance Kernels for Support Vector Machines”, IEEE Transactions on Neural Networks, Vol. 18, No. 5, 2007, pp. 1453-1462.
[3] Intrusion.com, Intrusion Secure Host, white paper available at: www.intrusion.com/products/hids.asp, 2003.
[4] W. Jansen, P. Mell,” Mobile Agents in Intrusion Detection and Response”, In Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, September 2010, pp.77-91.
[5] C. Kruegel, T. Toth,” Distributed Pattern Detection for Intrusion Detection”, In Proceedings of the Network and Distributed System Security Symposium Conference, Internet Society, Los Angeles, CA, February 2002.
[6] E. Eskin, A. Arnold, M. Prerau, L. Portnoy and S. Stolfo,”A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, in Applications of Data Mining in Computer Security”, S. Jajodia D. Barbara, “Advances In Information Security”, Ed. Boston: Kluwer Academic Publishers, 2012.
[7] M. Esmaili, R. Safavi-Naini, B. Balachandran and Pieprzyk, J.” A Case Based Reasoning for Intrusion Detection System”, December 1996, pp. 214 - 223, doi: 10.1109/CSAC.1996.569702. ISSN: 1063-9527 [In Proceedings of the 12th Annual Computer Security Applications Conference].
[8] German Florez-Larrahondo, Zhen Liu, Yoginder S. Dandass, Susan M. Bridges, and Rayford Vaughn, “Integrating Intelligent Anomaly Detection Agents into Distributed Monitoring Systems”, 2006, Vol. 1, issue 1, pp.59–77 , ISSN 1554-1010 Dynamic Publishers, Inc.[ Journal of Information Assurance and Security].
[9] C. Krugel, T. Toth,” A Survey on Intrusion Detection Systems”, Technical University of Vienna Technical report, April 2010, pp.410-417. [Online Available: http://citeseerx.ist.psu.edu/viewdoc/summary? doi=10.1.1.72.605.
[10] Yanny Liu, “An Introduction to Intrusion Detection Systems”, in ACC 626 Term Report for: Professor Malik Datardina, July 5, 2009 pp.1-9.
[11] Nathan Einwechter, “An Introduction to Distributed Intrusion Detection Systems”, January 8, 2001. [Online Available:http://www.symantec.com/connect/articles/introduction-distributed-intrusion-detection-systems (Accessed 30 April 2013).
[12] Yongguang Zhang, wenkelee,” Intrusion detection in Wireless ad-hoc networks”, Published in Mobicom’00 Proceedings of the 6th annual international conference on Mobile computing and networking pp 275-283
[13] Ghosh and A. Schwartzbard,”A Study in Using Neural Networks for Anomaly and Misuse Detection”, In Proceedings of the Eighth USENIX Security Symposium, Washington, D.C., August 1999, pp. 141-152.
[14] Amrita Anand, Brajesh Patel,” An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols”, International Journal Of Advanced Research in Computer Science and Software Engineering, vol.2 Issue.8,August 2012,ISSN: 2277 128X, pp.94-98.
[15] G. Helmer, J.S.K Wong, V. Honavar and L. Miller, “Intelligent Agents for Intrusion Detection”, In Proceedings of the IEEE Information Technology Conference, Syracuse, NY,September 2007, pp.121-124.
[16] Sriram Sundar Rajan, Vijaya Krishna Cherukuri- “An Overview of Intrusion Detection Systems”.
[17] Karthikeyan .K.R and A. Indra- “Intrusion Detection Tools and Techniques a Survey”
[18] “Top 125 Network Security Tools”- SecTools.Org-http://sectools.org/tag/ids/sec