Open Access   Article Go Back

A Brief Survey on Intrusion Detection System in Network Communication

M. Jeyakarthic1 , A. Thirumalairaj2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 167-172, Feb-2019

Online published on Feb 28, 2019

Copyright © M. Jeyakarthic, A. Thirumalairaj . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Jeyakarthic, A. Thirumalairaj, “A Brief Survey on Intrusion Detection System in Network Communication,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.167-172, 2019.

MLA Style Citation: M. Jeyakarthic, A. Thirumalairaj "A Brief Survey on Intrusion Detection System in Network Communication." International Journal of Computer Sciences and Engineering 07.04 (2019): 167-172.

APA Style Citation: M. Jeyakarthic, A. Thirumalairaj, (2019). A Brief Survey on Intrusion Detection System in Network Communication. International Journal of Computer Sciences and Engineering, 07(04), 167-172.

BibTex Style Citation:
@article{Jeyakarthic_2019,
author = {M. Jeyakarthic, A. Thirumalairaj},
title = {A Brief Survey on Intrusion Detection System in Network Communication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {167-172},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=744},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=744
TI - A Brief Survey on Intrusion Detection System in Network Communication
T2 - International Journal of Computer Sciences and Engineering
AU - M. Jeyakarthic, A. Thirumalairaj
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 167-172
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

Network Security is assuming an imperative job in a wide range of systems. These days the system is actualized in all spots like workplaces, schools, banks and so on and every one of the people are participating in informal community media. Despite the fact that numerous sorts of system security frameworks are being used, the helpless exercises are occurring occasionally. This research exhibits a study about different sorts of system attacks for the most part web attack, and distinctive Intrusion Detection System which are being used. This may clear a way to outline another sort of Intrusion Detection System which may shield the system framework from different kinds of system attack. Essentially Intrusion Detection Systems is been utilized based on two major methodologies first the acknowledgment of odd exercises as it by and large happens on the abandons normal or abnormal conduct and second abuse location by watching unapproved "marks" of those perceived vindictive attacks and grouping vulnerabilities. Oddity or the unknown (conduct based) Intrusion Detection Systems assume the distinction of ordinary conduct underneath assaults and accomplish anomalous exercises assessed and perceived with predefined framework or client conduct reference show. Our novel approach will mainly focus on detect the intrusion in network communication and provide a security.

Key-Words / Index Term

Network security, Intrusion detection system, Classification

References

[1] C Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing” www.ietf.org-RFC3561, 2003, pp 01-31.
[2] Dr. S. Vijayarani & Ms. Maria S.S., “Intrusion Detection System- A Study”, IJSPTM Vol4, No1, February 2015, pp 31-44.
[3] Ehsan Amiri, Hassan K, H Heidari, E. Mohamadi, Hossein M., “Intrusion Detection System in MANET: A Review”, Procedia- Social and Behavioral Sciences 129(2014), ELSEVIER, ScienceDirect, pp 453-459.
[4] Ming-Yang Su, Gwo-Jong, YuChun-Yuen Lin, “A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach” Computer & Security, ElLSEVIER, Volume 28, Issue 5, July 2009, Pages 301–309.
[5] Roman Fekolkin, “Intrusion Detection & Prevention System: Overview of Snort & Suricata” Internet Security, A7011N, Lulea University of Technology, Jan 06, 2015 pp 1-4.
[6] S. Mukkamala, G. Janoski, and A. Sung “Intrusion detection using neural networks and support vector machines,” International Joint Conference on Neural Networks (IJCNN). vol. 2: IEEE, 2002, pp. 1702- 1707.
[7] Ved Prakash Mishra & Balvinder Shukla, “Process Mining in Intrusion Detection – The need of current digital world”, Springer Nature Singapore Pte Ltd. 2017: CCIS 712, pp. 238–246, 2017.
[8] R. Fekolkin, “Intrusion Detection & Prevention System: Overview of Snort & Suricata, Internet Security”, A7011N, Lulea University of Technology, Jan 06, 2015 pp 1-4.
[9] Md. Mostaque & M Hassan, “Current studies on Intrusion Detection System”, Genetic algorithm and Fuzzy logic, International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.2.2013 pp. 35 -47.
[10] R.P.J.C Bose, W.M. P Van der Aalst, I, Žliobait˙e, & M Pechenizkiy, “Dealing with Concept Drifts in Process Mining”, IEEE Transactions on Neural Networks and Learning Systems, Vol. 25, No. 1, 2014 pp. 154 – 171.
[11] M.Y. Su, G Jong, Y Chun, & Y Lin, “A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach”, Computer & Security, ELSEVIER, Volume 28, Issue 5, 2009, pp 301–309.
[12] V P Mishra, Yogesh Waran, Subheshree, “Detecting Attacks Using Big Data with Process Mining”, International Journal of System Modeling and Simulation, v. 2, n. 2, June 2017, p. 5-7.
[13] Hussein, Safwan Mawlood, Fakariah Hani Mohd Ali, and Zolidah Kasiran. “Evaluation effectiveness of hybrid IDS using snort with naïve Bayes to detect attacks.” Digital Information and Communication Technology and it`s Applications (DiCTA?). 2012 Second international Conference on. IEEE, 2012.
[14]
[15] Marin, Jack, Daniel Ragsdale, and 1. Sirdu. “A hybrid approach to the profile creation and intrusion detection.” DARPA information Survivability Conference & Exposition ii, 2001.
[16] Aydin, M. Ali, A. Halim Zaim, and K. Gokhan Ceylan. “A hybrid intrusion detection system design for computer network security.” Computers & Electrical Engineering 35.3 (2009): 517-526.
[17] Arnza, Cristina, Catalin Leordeanu, and Valentin Cristea. "Hybrid network intrusion detection." Intelligent Computer Communication and Processing (ICCP), 2011 iEEE International Conference on. IEEE, 2011.
[18] Northcutt, Stephen. Snort: IDS and IPS toolkit. Eds. Jay Beale, and Toby Kohlenberg. Syngress Press, 2007.
[19] AI-mamory, Safaa, and Firas S. Jassim. "Evaluation of Different Data Mining Algorithms with KDD CUP 99 Data Set." Journal of Babylon University/Pure and Applied Sciences 21.8 (2013): 2663-2681.
[20] Shanmugavadivu, R., and N. Nagarajan. "Network intrusion detection system using fuzzy logic." Indian Journal of Computer Science and Engineering (JJCSE) 2.1 (2011): 10 I-Ill.
[21] Hochberg, Judith, et al. "NADIR: An automated system for detecting network intrusion and misuse." Computers & Security 12.3 (1993): 235- 248.
[22] Teng, Shaohua, et al. "A cooperative network intrusion detection based on fuzzy SVMs." Journal of Networks 5.4 (2010): 475-483.
[23] Mining, Data, I. Han, and M. Kamber. "Data mining concepts and techniques." Morgan Kaujinann (2006).
[24] IIgun, Koral, Richard A. Kemmerer, and Phillip A. Porras. "State transition analysis: A rule-based intrusion detection approach." iEEE transactions on software engineering 21.3 (1995): 181-199.
IIgun, Koral. "USTAT: A real-time intrusion detection system for UNIX." Research in Security and Privacy, 1993. Proceedings. , 1993 IEEE Computer Society Symposium on. IEEE, 1993.