A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS

Main Article Content

Gaurav Agrawal
Shivank Kumar Soni
Chetan Agrawal

Abstract

Now a day’s information of an organization floating over the internet that increases the traffic on the network, heavily uses of the internet give rise in traffic on the network as well as made the network data vulnerable. All this happened because of easy to access the data on the internet. So we needed a security mechanism to protect the sensitive data over the network. For protecting that information Intrusion Detection System (IDS) is placed in the system. IDS is a software or hardware device that deals with attacks by collecting information from a variety of system and network sources, then analyzing the symptoms of security problems. Network Intrusion Detection (NID) is an Intrusion Detection mechanism that attempts to discover unauthorized access to a computer network by analyzing traffic on the network. Host based Intrusion Detection (HID) analyses the user activities and decides that the user is authorized or not. There are lots of ways to implement an IDS system, and it depends on the usage of the systems or the requirements of an organization. This paper describes some or all of the main techniques to implement IDS. This paper aims towards the proper survey of intrusion detection system, the attacks and techniques to implement IDS, so that researchers can make use of it and can find the new techniques or ways to efficient implementation of IDS.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

A Murali M Rao, “A Survey on Intrusion Detection Approachesâ€, IEEE, P.P. 0-7803-9421-6, 2005.

K. Asif, Talha A. Khan, Sufyan Yakoob, “Network Intrusion Detection And Its Strategic Importanceâ€, Ieee Beiac, P.P 978-1-4673, September 2013.

Subaira.A.S, Anitha.P, “Efficient Classification Mechanism for Network Intrusion Detection System Based on Data Mining Techniques:a Survey†International conference on Intelligent System and Control(ISCO), IEEE, P.P. 978-1-4799-3837, July 2014.

F.Sabahi, A.Movaghar, “Intrusion Detection: A Surveyâ€, The Third International Conference on Systems and Networks Communications, IEEE, P.P. 23-26, ISBN 978--7695-3371-1, October 2008.

Adriana-Christina Enache, Victor Valeriu Patriciu, “Intrusions Detection Based on Support Vector Machine Optimized with Swarm Intelligenceâ€, 9th IEEE international symposium on Applied Computational Intelligence and Informaticsâ€, P.P. 978-1-4799-4694-5/14, May 2014.

Zhou Chunyue,Liu yun:Zang Hongke, “A Pattern matching based Network Intrusion Detection Systemâ€, ICARCV '06. 9th International Conference on Control, Automation, Robotics and Vision, 2006â€, IEEE, P.P. 1-4, E-ISBN 1-4214-042-1.

Deepthy K Denatious, Anita John, “Survey on Data Mining Techniques to Enhance Intrusion Detectionâ€, International Conference on Computer Communication and Informatics (ICCCI - 2012), IEEE, P.P. 1-5, ISBN: 978-1-4577-1580-8, January 2012.

Ming Xue,Changjun Zhu. “Applied Research On Data Mining Algorithm In Network Intrusion Detectionâ€, International Joint Conference On Artificial Intelligence, IEEE, P.P. 275-277, ISBN 978-0-7695-3615-6, April 2009.

W. Feng, Q. Zhng, G. Hu, J Xiangji Huang, â€Mining Network Data For Intrusion Detection Through Combining SVMs With Ant Colony Networks†Future Generation Computer Systems, 2013.

Uzair Bashir, Manzoor Chachoo, “Intrusion Detection and Prevention System: Challenges and Opportunitiesâ€, International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, P.P. 806-809, ISBN: 978-93-80544-10-6, March 2014.