Study of Intrusion Detection Systems

被引:0
|
作者
LiChin Huang [1 ]
MinShiang Hwang [2 ]
机构
[1] Department of Computer Science and Engineering, National Chung Hsing University
[2] Department of Computer Science & Information Engineering, Asia
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of well-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors.
引用
收藏
页码:269 / 275
页数:7
相关论文
共 50 条
  • [41] A Survey on Intrusion Detection and Prevention Systems
    Gupta N.
    Jindal V.
    Bedi P.
    [J]. SN Computer Science, 4 (5)
  • [42] A methodology for testing intrusion detection systems
    Puketza, NJ
    Zhang, K
    Chung, M
    Mukherjee, B
    Olsson, RA
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (10) : 719 - 729
  • [43] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [44] Virtualization in Network Intrusion Detection Systems
    Akhlaq, Monis
    Alserhani, Faeiz
    Awan, Irfan U.
    Cullen, Andrea J.
    Mellor, John
    Mirchandani, Pravin
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, 2009, 5872 : 6 - +
  • [45] Intrusion Detection Systems in MANET: A Review
    Amiri, Ehsan
    Keshavarz, Hassan
    Heidari, Hossein
    Mohamadi, Esmaeil
    Moradzadeh, Hossein
    [J]. 2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 : 453 - 459
  • [46] Vulnerabilities categories for intrusion detection systems
    Venter, HS
    Eloff, JHP
    [J]. COMPUTERS & SECURITY, 2002, 21 (07) : 617 - 619
  • [47] Hybrid Intrusion Detection in Information Systems
    Pierrot, David
    Harbi, Nouria
    Darmont, Jerome
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2014, : 27 - 31
  • [48] Optimal configuration of intrusion detection systems
    Birendra Mishra
    Inna Smirnova
    [J]. Information Technology and Management, 2021, 22 : 231 - 244
  • [49] Intrusion Detection Systems in Internet of Things
    Santos, Leonel
    Rabadao, Carlos
    Goncalves, Ramiro
    [J]. 2018 13TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2018,
  • [50] Active Learning for Intrusion Detection Systems
    Quang-Vinh Dang
    [J]. 2020 RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (RIVF 2020), 2020, : 382 - 384