Analysis of Intrusion Detection System

被引:0
|
作者
Gu Yue-sheng [1 ]
Feng Hong-yu [1 ]
Wang Jian-ping [1 ]
机构
[1] Henan Inst Sci & Technol, Xinxiang, Peoples R China
关键词
intrusion detection; model; collector; knowledge base; network security;
D O I
10.4028/www.scientific.net/KEM.460-461.451
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Intrusion detection system is an important device of information security. This article describes intrusion detection technology concepts, classifications and universal intrusion detection model, and analysis of the intrusion detection systems weaknesses and limitations. Finally, some directions for future research are addressed.
引用
收藏
页码:451 / 454
页数:4
相关论文
共 50 条
  • [21] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [22] General Study of Intrusion Detection System and Survey of Agent Based Intrusion Detection System
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 417 - 421
  • [23] A Survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and Protection System (IIDPS)
    Borkar, Amol
    Donode, Akshay
    Kumari, Anjali
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 949 - 953
  • [24] The Analysis of Application of Data Mining Technology in the System of Intrusion Detection
    Liu, Zhijun
    Pu, Xiaowei
    [J]. PROCEEDINGS OF 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 28, 2014, 28 : 75 - 78
  • [25] Performance Analysis of Snort-based Intrusion Detection System
    Garg, Akash
    Maheshwari, Prachi
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [26] Comparative performance analysis of classification algorithms for intrusion detection system
    Anbar, Mohammed
    Abdullah, Rosni
    Hasbullah, Iznan H.
    Chong, Yung-Wey
    Elejla, Omar E.
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [27] ATTACK PATTERN ANALYSIS FRAMEWORK FOR MULTIAGENT INTRUSION DETECTION SYSTEM
    Kolaczek, Grzegorz
    Juszczyszyn, Krzysztof
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2008, 1 (03) : 215 - 224
  • [28] An Analysis of Supervised Tree Based Classifiers for Intrusion Detection System
    Thaseen, Sumaiya
    Kumar, Ch. Aswani
    [J]. 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [29] Application Research on Retrospective Analysis System in Network Intrusion Detection
    Wu, Wei
    Cheng, Nan
    Wang, Yubin
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 624 - 627
  • [30] Analysis on the Application of Campus Network Firewall And Intrusion Detection System
    Wang, Jinying
    Yan, Pengfei
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 398 - 401