A Brief Introduction to Intrusion Detection System

被引:0
|
作者
Mohamed, Ashara Banu [1 ]
Idris, Norbik Bashah [1 ]
Shanmugum, Bharanidharan [1 ]
机构
[1] UTM, Kuala Lumpur, Malaysia
关键词
IDS; machine learning; forecasting; prediction; correlation; DESIGN;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection System (IDS) is a security system that acts as a protection layer to the infrastructure. Throughout the years, the IDS technology has grown enormously to keep up with the advancement of computer crime. Since the beginning of the technology in mid 80's, researches have been conducted to enhance the capability of detecting attacks without jeopardizing the network performance. In this paper we hope to provide a critical review of the IDS technology, issues that transpire during its implementation and the limitation in the IDS research endeavors. Lastly we will proposed future work while exploring maturity of the topic, the extent of discussion, the value and contribution of each research to the domain discussed. At the end of this paper, readers would be able to clearly distinguish the gap between each sub-area of research and they would appreciate the importance of these research areas to the industry.
引用
收藏
页码:263 / 271
页数:9
相关论文
共 50 条
  • [1] Network Attacks and Intrusion Detection System: A Brief
    Sharma, Neha V.
    Kavita
    Agarwal, Gaurav
    2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 280 - 283
  • [2] A Study on IDS (Intrusion Detection System) and Introduction of IFS (Intrusion Filtration System)
    Dewanjee, Rita
    Vyas, Ranjana
    COMPUTING AND NETWORK SUSTAINABILITY, 2017, 12 : 119 - 126
  • [3] Review on intrusion detection system for IoT/IIoT -brief study
    Komal Bansal
    Anita Singhrova
    Multimedia Tools and Applications, 2024, 83 : 23083 - 23108
  • [4] Review on intrusion detection system for IoT/IIoT -brief study
    Bansal, Komal
    Singhrova, Anita
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (8) : 23083 - 23108
  • [5] Introduction of Intrusion Detection System by Particle Swam Optimization
    Raut, Madhav G.
    INTERNATIONAL CONFERENCE ON MULTIDIMENSIONAL ROLE OF BASIC SCIENCE IN ADVANCED TECHNOLOGY (ICMBAT 2018), 2019, 2104
  • [6] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [7] Intrusion detection: Introduction to intrusion detection and security information management
    Debar, H
    Viinikka, J
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 207 - 236
  • [8] Intrusion detection: A brief history and overview
    Kemmerer, D
    Vigna, G
    COMPUTER, 2002, : 27 - 30
  • [9] A Brief Taxonomy of Intrusion Detection Strategies
    Poston, Howard E., III
    PROCEEDINGS OF THE 2012 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2012, : 255 - 263
  • [10] Brief analysis of intrusion detection techniques
    Qiong, Shi
    Zhen, Pan Guang
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6588 - 6591