A Survey on the Network Intrusion Detection System Using Data Mining Techniques
DOI:
https://doi.org/10.32628/CSEIT2062165Keywords:
Architecture, Attack, Detection, IDS, Prevention, DetectionAbstract
The idea of making everything available easily and universally has led to a revolution in the field of networking. Despite the tremendous growth of technologies in the field of networks and information technology, we still cannot avoid the theft / attack of our resources. This may not apply to small organizations, but it is a serious problem regarding industry / business or national security. Organizations face an increasing number of threats every day in the form of viruses, intrusions, etc. Since organizations have opted for many different mechanisms in the form of intrusion detection and prevention systems to protect themselves from this type of attack, there are many breach security systems that go undetected. To understand safety hazards and intrusion detection and prevention (IDPS) systems, we will first analyze common security breaches and then discuss what the different opportunities and challenges are in this particular field. In this document, we conducted a survey on the overall progress of intrusion detection systems. We analyze the existing types, techniques and architectures of intrusion detection systems in the literature. Finally, the future scope is mentioned.
References
- Y. F. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F. Wang, “Design and Implementation of a Scalable Intrusion Detection System for the Protection of Networks Infrastructure,” Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2, pp. 69-83, January 2000.
- E. Y. K. Chan et al., “IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks,” 7th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN'04), pp. 581-586, May 2004.
- Shyam Nandan Kumar, “DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds.” Journal of Computer Sciences and Applications, vol. 3, no. 3 (2015): 73-78.
- Shyam Nandan Kumar, and Amit Vajpayee, “A Survey on Secure Cloud: Security and Privacy in Cloud Computing”, American Journal of Systems and Software, vol. 4, no. 1, pp. 14-26, 2016
- Shyam Nandan Kumar, and Amit Vajpayee, “ASP: Advanced Security Protocol for Security and Privacy in Cloud Computing.” American Journal of Information Systems, vol. 4, no. 2, pp. 17-31. 2016.
- Debar, Hervé, Marc Dacier, and Andreas Wespi. "Towards a taxonomy of intrusion-detection systems." Computer Networks 31.8 (1999): 805-822.
- Karlzén, Henrik. "An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection,Management and Analysis." (2009).
- Singh, A., & Singh, M. (2014). Analysis of Host-Based and Network-Based Intrusion Detection System. International Journal of Computer Network and Information Security IJCNIS, 41-47.
- Pieter de Boer, Martin Pels, "Host-based Intrusion Detection Systems", Revision 1.10 – 2005, p: 5-7.
- Gupta, M. (2015). Hybrid Intrusion Detection System: Technology and Development. International Journal of Computer Applications IJCA, 5-8.
- Hay, A., & Cid, D. (2008). OSSEC host-based intrusion detection guide. Burlington, Mass.: Syngress Pub.
- James Cannady, Jay Harrell, 1996. "A Comparative Analysis of Current Intrusion Detection Technologies", p: 6.
- Gangwar, A., Sahu, S., Int. Journal of Engineering Research and Applications; ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.67-72.
- L. Portnoy, E. Eskin, and S.J. Stolfo. Intrusion detection with unlabeled data using clustering. In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA2001), pages 76–105. Philadelphia, PA, 2001.
- S. Mukkamala, G. Janoski, and A. Sung. Intrusion detection using neural networks and support vector machines. In Proceedings of the International Joint Conference on Neural Networks (IJCNN), volume 2, 2002
- Frank, Jeremy. "Artificial intelligence and intrusion detection: Current and future directions." Proceedings of the 17th National Computer Security Conference. Vol. 10. 1994.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.