Intrusion detection system models

被引:0
|
作者
Sin, LN [1 ]
Chuen, LM [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
intrusion detection models; intrusion detection systems; misuse detection; anomaly detection;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The recent dramatic increase in the number of malicious Internet and computer attacks has prompted a great interest in the research of intrusion detection (ID). As the first line of defense for computer and network systems, intrusion detection systems (IDSs) have been deployed more and more widely. Behind each IDS is an intrusion detection model which dictates to some extent the capability and the performance of the system. In this paper, we examine, analyze, and compare the prominent intrusion detection models from the literature in order to show the state-of-the-art IDS technology. ID models are based on two distinct detection approaches: misuse detection and anomaly detection. This paper also discusses how to select ID models for intrusion detection system development and throws light on the direction of further research in ID.
引用
收藏
页码:359 / 364
页数:6
相关论文
共 50 条
  • [1] EFFICIENT INTRUSION DETECTION SYSTEM MODELS
    Adsule, Urmila
    Pachghare, V. K.
    Kulkarni, Parag
    [J]. ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 199 - +
  • [2] Analysis of Continual Learning Models for Intrusion Detection System
    Prasath, Sai
    Sethi, Kamalakanta
    Mohanty, Dinesh
    Bera, Padmalochan
    Samantaray, Subhransu Ranjan
    [J]. IEEE ACCESS, 2022, 10 : 121444 - 121464
  • [3] Analysis and Evaluation of Hybrid Intrusion Detection System Models
    Bello, Farid Lawan
    Ravulakollu, Kiran
    Amrita
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, AND SYSTEMS (ICCCS), 2015, : 93 - 97
  • [4] HonIDS: Enhancing honeypot system with intrusion detection models
    Tang, Yong
    Hu, HuaPing
    Lu, XiCheng
    Wang, Jie
    [J]. FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 135 - +
  • [5] HMMPayl: An intrusion detection system based on Hidden Markov Models
    Ariu, Davide
    Tronci, Roberto
    Giacinto, Giorgio
    [J]. COMPUTERS & SECURITY, 2011, 30 (04) : 221 - 241
  • [6] Intrusion detection: Systems and models
    Sherif, JS
    Dearmond, TG
    [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 115 - 133
  • [7] Guarded Models For Intrusion Detection
    Saidi, Hassen
    [J]. PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY, 2007, : 85 - 94
  • [8] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [9] A Survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and Protection System (IIDPS)
    Borkar, Amol
    Donode, Akshay
    Kumari, Anjali
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 949 - 953
  • [10] General Study of Intrusion Detection System and Survey of Agent Based Intrusion Detection System
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 417 - 421