A comparative study on the currently existing intrusion detection systems

被引:2
|
作者
Ahmed, Martuza [1 ]
Pal, Rima [1 ]
Hossain, Md. Mojammel [1 ]
Bikas, Md. Abu Naser [1 ]
Hasan, Md. Khalad [1 ]
机构
[1] Shahjalal Univ Sci & Technol, Dept Comp Sci & Engn, Sylhet, Bangladesh
关键词
Intrusion Detection System; Host Based IDS; Network Based IDS; Trust Issue; Time Consumption;
D O I
10.1109/IACSIT-SC.2009.97
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Intrusion detection systems have become a standard component of network security infrastructure now-a-days. So far, several IDS s have been proposed. And they all have there own limitations as well as advantages. But there has been not enough significant works to put them all together and discuss their merits and demerits in a comparative manner. So when new researchers try to have a research on this specified topic then they have to waste a lot of their time and effort to bring them all together. And then they can start thinking of their own system. This paper however reduces those anxieties to a certain extent. In this paper we discuss almost all the noticeable IDS s proposed so far and focus on each of them respectively. And at last we conclude to some important factors that should come into issue while designing an efficient intrusion detection system.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [1] A comparative study of cyber security intrusion detection in healthcare systems
    Zhang, Yan
    Zhu, Degang
    Wang, Menglin
    Li, Junhan
    Zhang, Jie
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 44
  • [2] Intrusion techniques: Comparative study of network instrusion detection systems
    Garuba, Moses
    Liu, Chunmei
    Fraites, Duane
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 592 - 598
  • [3] Study of intrusion detection systems
    Yonghui, Cao
    [J]. BioTechnology: An Indian Journal, 2013, 8 (10) : 1353 - 1356
  • [4] Study of Intrusion Detection Systems
    Li-Chin Huang
    Min-Shiang Hwang
    [J]. Journal of Electronic Science and Technology, 2012, (03) : 269 - 275
  • [5] Study of Intrusion Detection Systems
    LiChin Huang
    MinShiang Hwang
    [J]. Journal of Electronic Science and Technology, 2012, 10 (03) : 269 - 275
  • [6] A comparative study of techniques for intrusion detection
    Mukkamala, S
    Sung, AH
    [J]. 15TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, : 570 - 577
  • [7] A Comparative Study of Different Fuzzy Classifiers for Cloud Intrusion Detection Systems' Alerts
    Alqahtani, Saeed M.
    John, Robert
    [J]. PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [8] Intrusion detection systems for RPL security: A comparative analysis
    Simoglou, George
    Violettas, George
    Petridou, Sophia
    Mamatas, Lefteris
    [J]. COMPUTERS & SECURITY, 2021, 104
  • [9] A Comparative Study of Alert Correlations for Intrusion Detection
    Beng, Leau Yu
    Ramadass, Sureswaran
    Manickam, Selvakumar
    Fun, Tan Soo
    [J]. 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 85 - 88
  • [10] A Comparative Study of Classification Techniques for Intrusion Detection
    Chauhan, Himadri
    Kumar, Vipin
    Pundir, Sumit
    Pilli, Emmanuel S.
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2013, : 40 - 43