Survey on Intrusion Detection System

Authors

  • Jesu Jayarin P  Associate Professor, Department of Computer Science Engineering, Jeppiaar Engineering College, Chennai, Tamil Nadu, India
  • Blessing Solomon. B. C.  PG Scholar, Department of Computer Science Engineering, Jeppiaar Engineering College, Chennai, Tamil Nadu, India

Keywords:

Anomaly Detection, Computer Security, Intruders, Intrusion Detection System

Abstract

Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A typical approach in interruption discovery models, particularly in irregularity recognition models, is to utilize classifiers as finders. Selecting the best set of features is central to ensuring the performance, speed of learning, accuracy, and reliability of these detectors as well as to remove noise from the set of features used to construct the classifiers. In most current systems, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. This survey paper aims at disclosing different strategies followed in Intrusion Detection Systems (IDSs) over the years. Due to the advancement in technologies, our coherent view is only on the latest trends.

References

  1. Akhil Gupta, Rakesh Kumar Jha, Pimmy Gandotra, "Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network", IEEE Transactions on Vehicular Technology, Vol.67, 1(2018), DOI: 10.1109/TVT.2017.2745110
  2. Chaitali Choure , Leena H. Patil, "A Literature Survey on Intrusion Detection and Protection System using Data Mining", International Journal of Advance Research, Ideas and Innovations in Technology, Vol.4, 1(2018), 61 - 65.
  3. Ennahbaoui M., Idrissi H, "Zero-Knowledge Authentication and Intrusion Detection System for Grid Computing Security", Information Innovation Technology in Smart Cities, (2018), 199-212, https://doi.org/10.1007/978-981-10-1741-4_14
  4. Gulshan Kumar, Rahul Saha, Mandeep Singh and Mritunjay Kumar Rai, "Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN", International Journal of Information Security and Privacy, 12,1(2018), DOI: 10.4018/IJISP.2018010105
  5. Jean Philippe Condomines, Riad Chemali, Nicolas Larrieu, "Network intrusion detection system for drone fleet using both spectral analysis and robust controller / observer", ENAC – Ecole Nationale de l’Aviation Civile, (2018), https://hal-enac.archives-ouvertes.fr/hal-01652296/
  6. Khalvati. L, M. Keshtgary and N. Rikhtegar, "Intrusion Detection based on a Novel Hybrid Learning Approach", Journal of AI and Data Mining Vol. 6, 1(2018), 157-162. DOI: 10.22044/JADM.2017.979
  7. Latika Mehrotra, Prashant Sahai Saxena and Nitika Vats Doohan, "A Data Classification Model: For Effective Classification of Intrusion in an Intrusion Detection System Based on Decision Tree Learning Algorithm", Information and Communication Technology for Sustainable Development, Vol. 9(2018) Springer, DOI: https://doi.org/10.1007/978-981-10-3932-4_7
  8. Matthew Spicer, "Intrusion Detection System for Electronic Communication Buses: A New Approach", (2018), https://vtechworks.lib.vt.edu/handle/10919/81863
  9. Muhammad Fahad Umer, Muhammad Sher, Yaxin Bi, "A two-stage flow-based intrusion detection model for next-generation networks", https://doi.org/10.1371/journal.pone.0180945
  10. Nagaraju. S, Sudhakara Reddy. P, "High-Throughput Low-Power Variable Rate Network Intrusion Detection System Using Unique SRAM Controller", Proceedings of 2nd International Conference on Micro-Electronics, Electromagnetics and Telecommunications, Vol. 434(2018), DOI: https://doi.org/10.1007/978-981-10-4280-5_18
  11. Samarjeet Borah, Ranjit Panigrahi and Anindita Chakraborty, "An Enhanced Intrusion Detection System Based on Clustering", Progress in Advanced Computing and Intelligent Engineering, (2018), 37-45.
  12. Seung Hyun Kim, Su Chang Lim, Do Yeon Kim, "Intelligent intrusion detection system featuring a virtual fence, active intruder detection, classification, tracking, and action recognition", Annals of Nuclear Energy, Vol.112, (2018), 845-855.
  13. Shawq Malik Mehibs, Soukaena Hassan Hashim, "Proposed Network Intrusion Detection System ‎Based on Fuzzy c Mean Algorithm in Cloud ‎Computing Environment", Journal of University of Babylon, Vol. 26, 2(2018), 27-35. https://doi.org/10.29196/jub.v26i2.471
  14. Tarfa Hamed, Rozita Dara, Stefan C. Kremer, "Network intrusion detection system based on recursive feature addition and bigram technique", Computers & Security, Vol.73 (2018), 137-155, DOI: https://doi.org/10.1016/j.cose.2017.10.011
  15. Xianwei Hu, Tie Li, Zongzhi Wu, Xuan Gao, Zhiqiang Wang, "Research and Application of Intelligent Intrusion Detection System with Accuracy Analysis Methodology", Infrared Physics & Technology, (2018), https://doi.org/10.1016/j.infrared.2017.11.032

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Jesu Jayarin P, Blessing Solomon. B. C., " Survey on Intrusion Detection System , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1766-1774, March-April-2018.