A Survey on Robust Intrusion Detection System Methodology and Features
DOI:
https://doi.org/10.26438/ijcse/v6i10.754760Keywords:
Anomaly Detection, ANN, Clustering, Genetic Algorithm, Intrusion DetectionAbstract
To enhance organize security diverse advances has been taken as size and significance of the system has builds step by step. Keeping in mind the end goal to discover interruption in the system Intrusion recognition frameworks were developed which were comprehensively arrange into two category first was misused based and other was anomaly based. In this paper review was done on the different methods of intrusion recognition framework where some of administered and unsupervised interruption location procedures were informed in detail. Here technique of different researcher are clarified with there ventures of working. Diverse kinds of attacks done by the interlopers were additionally surveyed
References
[1] Shaohua Teng, Naiqi Wu, Senior, Haibin Zhu, Senior, Luyao Teng, And Wei Zhang. “SVM-DT-Based Adaptive And Collaborative Intrusion Detection”. IEEE/CAA JOURNAL OF AUTOMATICA SINICA, VOL. 5, NO. 1, JANUARY 2018.
[2] Aljurayban, N.S Emam, A. (21-23 March 2015). Framework For Cloud Intrusion Detection System Service. Web Applications And Networking (WSWAN), 2015 2nd World Symposium On, P1-5
[3] Mr Mohit Tiwari,Raj Kumar, Akash Bharti, Jai Kishan. “Intrusion Detection System”. International Journal Of Technical Research And Applications E-ISSN: 2320-8163, Volume 5, Issue 2 (March - April 2017), PP. 38-44.
[4] YU-XIN MENG,” The Practice On Using Machine Learning For Network Anomaly Intrusion Detection” Department Of Computer Science, City University Of Hong Kong, Kowloon, Hong Kong, 978-1-4577-0308-9/11/$26.00 ©2011 IEEE
[5] Kai Peng, Victor C.M. Leung, Qingjia Huang. “Clustering Approach Based On Mini Batch Kmeans For Intrusion Detection System Over Big Data”. IEEE Transaction 2169-3536 © 2017. .
[6] Chuanlong Yin , Yuefei Zhu, Jinlong Fei, And Xinzheng He. “A Deep Learning Approach For Intrusion Detection Using Recurrent Neural Networks” Current Version November 7, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2762418.
[7] Mohammadreza Ektefa, Sara Memar, Fatimah Sidi, Lilly Suriani Affendey “Intrusion Detection Using Data Mining Techniques”, 978-1-4244-5651-2/10/$26.00 ©2010 IEEE
[8] Premansu Sekhara Rath, 2manisha Mohanty, 3silva Acharya, 4monica Aich “Optimization Of Ids Algorithms Using Data Mining Technique” International Journal Of Industrial Electronics And Electrical Engineering, ISSN: 2347-6982 Volume-4, Issue-3, Mar.-2016
[9] Liu Hui, CAO Yonghui “Research Intrusion Detection Techniques From The Perspective Ofmachine Learning” 2010 Second International Conference On Multimedia And Information Technology 978-0-7695-4008-5/10 $26.00 © 2010 IEEE
[10] Barolli Leonard, Elmazi, Donald; Ishitaki, Oda, Tetsuya; Taro; Yi Liu, Uchida, Kazunori. (24-27 March 2015). Application Of Neural Networks For Intrusion Detection In Tor Networks. Advanced Information Networking And Applications Workshops (WAINA), 2015 IEEE 29th International Conference On, P67-72.
[11] Zhiyuan Tan, Aruna Jamdagni, Xiangjian, Priyadarsi Nanda, Ren Ping Liu, “A System For Denial-Of-Service Attack Detection Based On Multi- Variate Correlation Analysis”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL:25 NO:2 YEAR 2014.
[12] Mario Guimaraes, Meg Murray. Overview Of Intrusion Detection And Intrusion Prevention, Information Security Curriculum Development Conference By ACM (2008).
[13] Koushal Kumar, Jaspreet Singh Batth “Network Intrusion Detection With Feature Selection Techniques Using Machine-Learning Algorithms” International Journal Of Computer Applications (0975 – 8887) Volume 150 – No.12, September 2016.
[14] Muhammad Awais Shibli, Sead Muftic. Intrusion Detection And Prevention System Using Secure Mobile Agents, IEEE International Conference On Security & Cryptography (2008).
[15] David Wagner, Paolo Soto. Mimicry Attacks On Host Based Intrusion Detection Systems, 9th ACM Conference On Computer And Communications Security (2002).
[16] Harley Kozushko. Intrusion Detection: Host-Based And Network-Based Intrusion Detection Systems, (2003).
[17] Lin Tan, Timothy Sherwood. A High Throughput String Matching Architecture For Intrusion Detection And Prevention, Proceedings Of The 32nd Annual International Symposium On Computer Architecture (ISCA 2005).
[18] Nouf Saleh Aljurayban, Ahmed Emam “Framework For Cloud Intrusion Detection System Service”. DOI: 10.1109/ WSWAN.2015. 7210298, IEEE, 20 August 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
