CFP last date
20 March 2024
Reseach Article

Classification of Intrusion Detection System

by Abhishek Pharate, Harsha Bhat, Vaibhav Shilimkar, Nalini Mhetre
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 7
Year of Publication: 2015
Authors: Abhishek Pharate, Harsha Bhat, Vaibhav Shilimkar, Nalini Mhetre
10.5120/20758-3163

Abhishek Pharate, Harsha Bhat, Vaibhav Shilimkar, Nalini Mhetre . Classification of Intrusion Detection System. International Journal of Computer Applications. 118, 7 ( May 2015), 23-26. DOI=10.5120/20758-3163

@article{ 10.5120/20758-3163,
author = { Abhishek Pharate, Harsha Bhat, Vaibhav Shilimkar, Nalini Mhetre },
title = { Classification of Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 7 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number7/20758-3163/ },
doi = { 10.5120/20758-3163 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:03.372253+05:30
%A Abhishek Pharate
%A Harsha Bhat
%A Vaibhav Shilimkar
%A Nalini Mhetre
%T Classification of Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 7
%P 23-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Use of internet is increasing to great extent and with it abnormal and malicious activities. Solving problem of these attacks is becoming a prime need of network services. Till date many techniques and algorithms are developed. All these can be summed to intrusion detection systems and firewall. In this paper we present the classification of these intrusion detection systems on the basis of their properties. So it will help in understanding different IDS and their properties accordingly. With different types IDS classification it also enlists pros and cons of systems.

References
  1. Marion Bogdanov ,"An approach to developing an information assurance environment"
  2. Sanjay Kumar Sharma, Pankaj Pande, Susheel Kumar Tiwari and Mahendra Singh Sisodia ,"An Improved Network Intrusion Detection technique based on k-means clustering via naïve Byes Classification" IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012
  3. Thanvarat Komviriyavut, Phurivit Sangkatsanee, Naruemon Wattanapongsakorn, "Network intrusion detection and classification with decision tree and rule based approach" IEEE, 2009
  4. Deris Stiawan, Ala' Yaseen Ibrahim Shakhatreh, Mohd. Yazid Idris, Kamarulnizam Abu Bakar, Abdul Hanan Abdullah, "Intrusion prevention system: a survey" Journal of Theoretical and Applied Information Technology 15 June 2012. Vol. 40 No. 1
  5. N. Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, C. Charnsripinyo, "A Practical Network based Intrusion Detection and Prevention System" 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
  6. K. B. Chandradeep, "A scheme for the design and implementation of a distributed ids" 2009 First International Conference on Networks & Communications
  7. Kjetil Haslum, Ajith Abraham and Svein Knapskog, "Fuzzy online risk assessment for distributed intrusion prediction and prevention systems" Tenth International Conference on Computer Modeling and Simulation
  8. Hakan Albag, "Network & agent based intrusion detection systems"
  9. Vinod Kumar, Dr. Om Prakash Sangwan, "Signature based intrusion detection system using Snort" International Journal of Computer Applications & Information Technology Vol. I, Issue III, November 2012 (ISSN: 2278-7720)
  10. V. Jyothsna, V. V. Rama Prasad, K. Munivara Prasad, "A review of anomaly based intrusion detection systems" International Journal of Computer Applications (0975 – 8887) Volume 28– No. 7, August 2011
  11. Maithili Arjunwadkar, R. V. Kulkarni, "The rule based intrusion detection and prevention model for biometric system" VOL. 1, NO. 2, Oct 2010 Journal of Emerging Trends in Computing and Information Sciences
  12. Todd Vollmer, Jim Alves-Foss, Milos Manic, "Autonomous rule creation for intrusion detection" 2011 IEEE Symposium on Computational Intelligence in Cyber Security
  13. Matti Manninen, "Using Artificial Intelligence in intrusion detection systems"
  14. Shaik Akbar, Dr. K. Nageswara Rao, Dr. J. A. Chandulal. "Implementing rule based genetic algorithm as a solution for intrusion detection system" IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 8, August 2011
  15. Zorana Bankovic, Dus?an Stepanovic, Slobodan Bojanic, Octavio Nieto-Taladriz, "Improving network security using genetic algorithm approach" Computers and Electrical Engineering 33 (2007) 438–451
  16. Borgersen Gustav, Karlsson Linus, "Supervised learning in artificial neural networks"
  17. Peter Dayan, "Unsupervised Learning" Appeared in Wilson, RA & Keil, F, editors. The MIT Encyclopedia of the Cognitive Sciences
  18. Phurivit Sangkatsanee, Naruemon Wattanapongsakorn, and Chalermpol Charnsripinyo, "Real-time intrusion detection and classification"
  19. Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das, "The 1999 DARPA offline intrusion detection evaluation"
Index Terms

Computer Science
Information Sciences

Keywords

NIDS HIDS Intrusion Detection DoS Probe Genetic Algorithm.