Study of Intrusion Detection Systems

被引:0
|
作者
LiChin Huang [1 ]
MinShiang Hwang [2 ]
机构
[1] Department of Computer Science and Engineering, National Chung Hsing University
[2] Department of Computer Science & Information Engineering, Asia
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of well-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors.
引用
收藏
页码:269 / 275
页数:7
相关论文
共 50 条
  • [1] Study of intrusion detection systems
    Yonghui, Cao
    [J]. BioTechnology: An Indian Journal, 2013, 8 (10) : 1353 - 1356
  • [2] Study of Intrusion Detection Systems
    Li-Chin Huang
    Min-Shiang Hwang
    [J]. Journal of Electronic Science and Technology, 2012, (03) : 269 - 275
  • [3] Diversity with Intrusion Detection Systems: An Empirical Study
    Algaith, Areej
    Elia, Ivano Alessandro
    Gashi, Ilir
    Vieira, Marco
    [J]. 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2017, : 19 - 23
  • [4] A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems
    Ramaki, Ali Ahmadian
    Rasoolzadegan, Abbas
    Bafghi, Abbas Ghaemi
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (03)
  • [5] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [6] INTRUSION DETECTION SYSTEMS
    WILLIAMS, JD
    [J]. TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1979, 33 (NOV): : 733 - 734
  • [7] Intrusion detection systems
    [J]. IEEE Intelligent Systems and Their Applications, 2001, 16 (01):
  • [8] Intrusion Detection Systems for the Internet of Thing: A Survey Study
    Hassan, Heba A.
    Hemdan, Ezz E.
    El-Shafai, Walid
    Shokair, Mona
    Abd El-Samie, Fathi E.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (04) : 2753 - 2778
  • [9] A comparative study on the currently existing intrusion detection systems
    Ahmed, Martuza
    Pal, Rima
    Hossain, Md. Mojammel
    Bikas, Md. Abu Naser
    Hasan, Md. Khalad
    [J]. IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE, 2009, : 151 - 154
  • [10] Testing intrusion detection systems in MANET: A comprehensive study
    Otrok, Hadi
    Paquet, Joey
    Debbabi, Mourad
    Bhattacharya, Prabir
    [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 364 - +