Open Access Open Access  Restricted Access Subscription Access

Classification and Analysis of Techniques Applied in Intrusion Detection Systems


Affiliations
1 Department of Information Technology, Jomo Kenyatta University of Agriculture and Technology (JKUAT), Kenya
 

Currently, the development of most of organizations depends on technology for mining information, storing and its transactions. But these frequent use online technologies make the data to be exposed to the risk of attacks that compromise the normal activities of systems. To protect and prevent these attacks, the researchers had implemented the intrusion detection systems (IDS). Even the IDS are so many, the attacks still also increasing in different forms. This paper reviews most techniques usable in IDS, to help users and security professionals to take robust measures in identifying the strength and weakness of each technique. The result of this study shows that majority of techniques perform well at rate more than 99%.

Keywords

Data Mining, IDS, Normalization.
User
Notifications
Font Size

Abstract Views: 174

PDF Views: 0




  • Classification and Analysis of Techniques Applied in Intrusion Detection Systems

Abstract Views: 174  |  PDF Views: 0

Authors

Calpephore Nkikabahizi
Department of Information Technology, Jomo Kenyatta University of Agriculture and Technology (JKUAT), Kenya
Wilson Cheruiyot
Department of Information Technology, Jomo Kenyatta University of Agriculture and Technology (JKUAT), Kenya
Ann Kibe
Department of Information Technology, Jomo Kenyatta University of Agriculture and Technology (JKUAT), Kenya

Abstract


Currently, the development of most of organizations depends on technology for mining information, storing and its transactions. But these frequent use online technologies make the data to be exposed to the risk of attacks that compromise the normal activities of systems. To protect and prevent these attacks, the researchers had implemented the intrusion detection systems (IDS). Even the IDS are so many, the attacks still also increasing in different forms. This paper reviews most techniques usable in IDS, to help users and security professionals to take robust measures in identifying the strength and weakness of each technique. The result of this study shows that majority of techniques perform well at rate more than 99%.

Keywords


Data Mining, IDS, Normalization.