Open Access
Subscription Access
Open Access
Subscription Access
An Efficient Intrusion Detection System Using Computational Intelligence
Subscribe/Renew Journal
Intrusion detection system is one of the widely used tools for defense in Computer Networks. In literature, plenty of research is published on Intrusion Detection Systems. In this paper we present a survey of Intrusion Detection Systems. We survey the existing types, techniques and approaches of Intrusion Detection Systems in the literature. Finally we propose a new architecture for Intrusion Detection System and outline the present research challenges and issues in Intrusion Detection System
Keywords
Intrusion Detection, Neural Network, Fuzzy logic, Artificial Intelligence, Honeypot, Data Mining
Subscription
Login to verify subscription
User
Font Size
Information
- Suhail Owais, Václav Snášel, Pavel Krömer, Ajith Abraham “Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques” CISIM 2008, IEEE, ISBN: 978-0-7695-3184-7
- Rakesh Agrawal, Ramakrishnan S&ant “Fast Algorithms for Mining Association Rules”, Proceddings of the 20th VLDB Conference Santiago, Chile, 1994
- Hu Zhengbing1, Li Zhitang1,Wu Junqi, ” A Novel Network Intrusion Detection System(NIDS) Based on Signatures Search of Data Mining” 2008 IEEE, Workshop on Knowledge Discovery and Data Mining
- Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, and Chun-Yuen Lin, “A Real-time Network Intrusion Detection System Based on Incremental Mining Approach”, 2008 IEEE
- Babak Khosravifar, Jamal Bentahar, “An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot”, 2008 IEEE, 22nd International Conference on Advanced Information Networking and Applications
- Marimuthu, Dr. A. Shanmugan, “Intelligent Progression for Anomoly Intrusion Detection”, 2008 IEEE, ISBN: 978-1-4244-2106-0
- ZHAN Jiuhua, “Intrusion Detection System Based on Data Mining”, 2008 IEEE, Workshop on Knowledge Discovery and Data Mining
- Youssif Al-Nashif, Aarthi Arun Kumar, Salim Hariri, Guangzhi Qu, Yi Luo, Ferenc Szidarovsky, “Multi-Level Intrusion Detection System”, 2008 IEEE, International Conference on Automonic Computing
- Bane Raman Raghunath, Shivsharan Nitin Mahadeo, “Network Intrusion Detection System”, 2008 IEEE, First International Conference on Emerging Trends in Engineering and Technology
- Joong-Hee Leet, Jong-Hyouk Leet, Seon-Gyoung Sohn, Jong-Ho Ryu, and Tai- Myoung Chungt, “Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System”, 2008 IEEE, ISBN: 978-89-5519- 136-3
- Lgor Vinicius Mussoi de Lima, Joelson Alencar Degaspari, Jo˜ao Bosco Mangueira Sobral, “Intrusio n Detection Through Artificial Neural Networks”, 2008 IEEE, ISBN: 978-1-4244-2066-7
- Do-hyeon Lee, Doo-young Kim, Jae-il Jung, “Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm”, 2008 IEEE, International Conference on Information Science and Security .
- Lu Huijuan, Chen Jianguo,d Wei Wei, “Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System”, 2008 IEEE, Internation al Symposium on Electronic Commerce and Security
- Divyata Dal, Siby Abraham, Ajith Abraham, Sugata Sanyal, Mukund Sanglikar, “Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System”, 2008 IEEE, 7th Computer Information Systems and Industrial Management Applications
- Amin Hassanzadeh, Babak Sadeghian, “Intrusion Detection with Data Correlation Relation Graph”, 20 08 IEEE, The Third International Conference on Availability, Reliability and Security
- S.Sangeetha, V. Vaidehi, N.Srinivasan, K.V. Rajkumar, S. Pradeep, N.Ragavan, C.Sri Sai Lokesh, I.Subadeepak, V.Prashanth, “Implementation Of Application Layer Intrusion Detection System Using Protocol Analysis”, IEEE 2008, IEEE International Conference on Signal processing, Communications and Networking
- Mrs. P. Kola Sujatha Dr. A. Kannan S. Ragunath K. Sindhu Bargavi S. Githanjali,“A Behavior Based Approach to Host-Level Intrusion Detection using Self-organizing Maps”, 2008 IEEE, First International Conference on Emerging Trends in Engineering and Technology
- Robert, Richardson, “2007 Computer Crime and Security Survey”, http://i.cmpnet.com/v2.gocsi.com/pdf/CSISurvey2007.p df
- Ya-Li Ding, Lei Li, Hong-Qi Luo, “A novel signature searching for Intrusion Detection System using data mining”, 2009 IEEE Eighth International Conference on Machine Learning and Cybernetics ISBN: 978-1-4244-3703-0
- Juan Wang, Qiren Yang, Dasen Ren “An intrusion detection algorithm based on decision tree technology”, 2009 IEEE Asia-Pacific Conference on Information Processing ISBN: 978-0-7695-3699-6
- Rakesh Agrawal, Arun Swami, Tomasz Imielinski, “Mining Association Rules between Sets of Items in Large Databases” , Proceedings of the 1993 ACM SIGMOD Conference Washington DC, USA, May 1993
- Heikki Manila, Hannu Toivonen, A. Inkeri Verkamo “Efficient Algorithm s for Discovering Association Rules”, Knowledge Discovery in Databases (KDD’94) U.M. FAYYAD and R. Uthurusamy (EDS), AAAI Press, 1994, p. 181 – 192
- “Creation and Deployment of Data Mining-Based Intrusion Detection Systemsin Oracle Database 10g ” http://www.oracle.com/technology/products/bi/odm/pdf/odm_based_intrusion_dete ction_paper_1205. pdf
Abstract Views: 497
PDF Views: 4