An Overview Of Intrusion Detection System Using Various Classification Concepts

Authors

  • Shukla K Department of Computer Science, SRK University, Bhopal, India
  • Gupta RK Department of Computer Science, SRK University, Bhopal, India Department of Computer Science, SRK University, Bhopal, India
  • Namdeo V Department of Computer Science, SRK University, Bhopal, India

DOI:

https://doi.org/10.26438/ijcse/v6i11.672675

Keywords:

Attacks, Classification, Communication, Detection, DoS, Intrusion, R2L, Signature

Abstract

As technological interconnection and digital communication schemes wide spreading, data accessing required to be kept in sharing environment and hence it will surely lead to compromise the data in many aspects. So to keep data secure and protected there are variety of techniques and tools also developed and Intrusion detection system (IDS) is one of them. IDS system conceptualized with identifying the intrusions in place of stopping the attacks. There are various techniques discussed here in context of signature and behavior based IDS. These IDS tools use different identification techniques to classify and identify the attacks and type of attacks. This paper includes different types IDS which has capability inclusion of identifying attacks like probe, DoS, R2L etc. It is also covering categorized descriptions of host based as well as network based hybrid intrusion detection systems.

References

[1] Roshan Kumar, Deepak SharmaHyINT: Signature-Anomaly Intrusion Detection System 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2018.

[2] A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS) IEEE 2017.

[3] Akash Garg ; Prachi Maheshwari,10th International Conference on Intelligent Systems and Control (ISCO), 2016.

[4] Chaimae Saadi ,Ensak-Morroco and Habiba Chaoui “Intrusion detection system based interaction on mobile agents and clust-density algorithm “IDS-AM-Clust”, International Colloquium on Information Science and Technology (CiSt),IEEE,2016.

[5] ShailendraSahu and B M Mehtre ,"Network Intrusion Detection System Using J48 Decision Tree," 2015 IEEE.

[6] Sara Chadli,Mohamed Emharraf and Mohammed Saber "The design of an IDS architecture for MANET based on multi-agent" International Colloquium on Information Science and Technology (CiSt),IEEE,2014.

[7] Difan Zhang, Linqiang Ge, Rommie Hardy, Authersi Yu, Hanlin Zhang and Robert Reschly, "On Effective Data Aggregation Techniques In Host-based Intrusion Detection in MANET," The 10th Annual IEEE CCNC- Green Communications and Computations Track 2013 IEEE.

[8] Jitendra S Rathore, Praneet Saurabh, Bhupendra Verma “AgentOuro: A Novelty Based Intrusion Detection and Prevention System” Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on 3-5 Nov. 2012.

[9] Akthar, F. and Hahne, C. Rapid Miner 5 Operator Reference, 2012.

[10] Bin Zeng , Lu Yao and ZhiChen Chen"A network intrusion detection system with the snooping agents",International Conference on Computer Application and System Modeling, 2010.

[11] Vera Marinova-Boncheva, “A Short Survey of Intrusion Detection Systems”, Problems of Engineering Cybernetics and Robotics, 2007.

[12] Khaled Labib, Computer security and intrusion detection, Crossroads, Volume 11, Issue 1, August 2004.

[13] Murthy, S.K. , Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey. Data Mining and Knowledge Discovery, 24, 1998.

[14] Aurobindo Sundaram, An Introduction to Intrusion Detection, Crossroads, Volume 2, Issue 4, Pages: 3 –7, 1996.

[15] Northcutt, S. “Network Intrusion Detection: An Analyst’s Handbook.” New Riders, Indianapolis 1999.

Downloads

Published

2025-11-18
CITATION
DOI: 10.26438/ijcse/v6i11.672675
Published: 2025-11-18

How to Cite

[1]
K. Shukla, R. Gupta, and V. Namdeo, “An Overview Of Intrusion Detection System Using Various Classification Concepts”, Int. J. Comp. Sci. Eng., vol. 6, no. 11, pp. 672–675, Nov. 2025.