Analysis of Intrusion Detection System

被引:0
|
作者
Gu Yue-sheng [1 ]
Feng Hong-yu [1 ]
Wang Jian-ping [1 ]
机构
[1] Henan Inst Sci & Technol, Xinxiang, Peoples R China
关键词
intrusion detection; model; collector; knowledge base; network security;
D O I
10.4028/www.scientific.net/KEM.460-461.451
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Intrusion detection system is an important device of information security. This article describes intrusion detection technology concepts, classifications and universal intrusion detection model, and analysis of the intrusion detection systems weaknesses and limitations. Finally, some directions for future research are addressed.
引用
收藏
页码:451 / 454
页数:4
相关论文
共 50 条
  • [31] Comparative performance analysis of classification algorithms for intrusion detection system
    Anbar, Mohammed
    Abdullah, Rosni
    Hasbullah, Iznan H.
    Chong, Yung-Wey
    Elejla, Omar E.
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [32] Research on Distributed Intrusion Detection System Based on Protocol Analysis
    Qu, Xiaohong
    Liu, Zhijie
    Xie, Xiaoyao
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 421 - 424
  • [33] Analysis on intrusion detection system using machine learning techniques
    Seraphim, B. Ida
    Poovammal, E.
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 423 - 441
  • [34] Asymptotic Analysis of A Fuzzy Based Intrusion Detection System For Zigbee
    Maphatsoe, Tsitso
    Masinde, Muthoni
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 89 - 96
  • [35] An Intrusion Detection System Based on Polynomial Feature Correlation Analysis
    Li, Qingru
    Tan, Zhiyuan
    Jamdagni, Aruna
    Nanda, Priyadarsi
    He, Xiangjian
    Han, Wei
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 978 - 983
  • [36] AN EVOLUTIONARY GAME ANALYSIS OF THE INTERACTION WITH FIREWALL AND INTRUSION DETECTION SYSTEM
    Yin, Ying
    Xia, Zi-Chao
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2787 - +
  • [37] PERFORMANCE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM
    Jadhav, Abhijit D.
    Pellakuri, Vidyullatha
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [38] Application and Performance Analysis of Data Preprocessing for Intrusion Detection System
    Jiang, Shuai
    Xu, Xiaolong
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 163 - 177
  • [39] Honeypot-Based Intrusion Detection System: A Performance Analysis
    Kondra, Janardhan Reddy
    Bharti, Santosh Kumar
    Mishra, Sambit Kumar
    Babu, Korra Sathya
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2347 - 2351
  • [40] Automatic analysis of firewall and network intrusion detection system configurations
    Uribe, Tomas
    Cheung, Steven
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 691 - 715