Approaches and Data Processing Techniques for Intrusion Detection Systems

被引:0
|
作者
Srinivasu, Pakkurthi [1 ]
Avadhani, P. S. [2 ]
Korimilli, Vishal [1 ]
Ravipati, Prudhvi [1 ]
机构
[1] Anil Neerukonda Inst Technol & Sci, Dept CSE, Sangivalasa, Andhra Pradesh, India
[2] Andhra Univ, Dept CS & SE, Coll Engn, Waltair, Andhra Pradesh, India
关键词
Intrusion Detection System; Type of attacks; Anomaly based intrusion detection; Misuse based intrusion detection; Network Security; Data Processing Techniques;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection systems (IDS). In this paper an overview of types of attacks, IDS components, and classifications of IDS is briefly given. Two approaches from the classification of IDS are also presented. They are anomaly-based detection and misuse-based detection. Anomaly-based detection approach is extremely powerful and novel tool which identifies anomalies as deviations from "normal" behavior and automatically detects any deviation from it. Misuse-based detection approach explicitly defines the attack behavior and classifies all events matching these specifications as attack. Data processing techniques for intrusion detection systems are also presented.
引用
收藏
页码:181 / 186
页数:6
相关论文
共 50 条
  • [1] Intrusion detection techniques and approaches
    Verwoerd, T
    Hunt, R
    [J]. COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1356 - 1365
  • [2] Data warehousing and data mining techniques for intrusion detection systems
    Anoop Singhal
    Sushil Jajodia
    [J]. Distributed and Parallel Databases, 2006, 20 : 149 - 166
  • [3] Data warehousing and data mining techniques for intrusion detection systems
    Singhal, Anoop
    Jajodia, Sushil
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2006, 20 (02) : 149 - 166
  • [4] Data mining for intrusion detection: Techniques, applications and systems
    Pei, H
    Upadhyaya, SJ
    Farooq, F
    Govindaraju, V
    [J]. 20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 877 - 877
  • [5] A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS
    Chakravarthi, S. Sreenivasa
    Veluru, Suresh
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 730 - 737
  • [6] Data mining approaches for intrusion detection
    Lee, W
    Stolfo, SJ
    [J]. PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 79 - 93
  • [7] Adaptation techniques for intrusion detection and intrusion response systems
    Ragsdale, DJ
    Carver, CA
    Humphries, JW
    Pooch, UW
    [J]. SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2344 - 2349
  • [8] Exploiting efficient data mining techniques to enhance intrusion detection systems
    Lu, CT
    Boedihardjo, AP
    Manalwar, P
    [J]. Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005, : 512 - 517
  • [9] Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems
    Santos, Kelson Carvalho
    Miani, Rodrigo Sanches
    Silva, Flavio de Oliveira
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (02)
  • [10] Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
    Salo, Fadi
    Injadat, Mohammadnoor
    Nassif, Ali Bou
    Shami, Abdallah
    Essex, Aleksander
    [J]. IEEE ACCESS, 2018, 6 : 56046 - 56058