Approaches and Data Processing Techniques for Intrusion Detection Systems

被引:0
|
作者
Srinivasu, Pakkurthi [1 ]
Avadhani, P. S. [2 ]
Korimilli, Vishal [1 ]
Ravipati, Prudhvi [1 ]
机构
[1] Anil Neerukonda Inst Technol & Sci, Dept CSE, Sangivalasa, Andhra Pradesh, India
[2] Andhra Univ, Dept CS & SE, Coll Engn, Waltair, Andhra Pradesh, India
关键词
Intrusion Detection System; Type of attacks; Anomaly based intrusion detection; Misuse based intrusion detection; Network Security; Data Processing Techniques;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection systems (IDS). In this paper an overview of types of attacks, IDS components, and classifications of IDS is briefly given. Two approaches from the classification of IDS are also presented. They are anomaly-based detection and misuse-based detection. Anomaly-based detection approach is extremely powerful and novel tool which identifies anomalies as deviations from "normal" behavior and automatically detects any deviation from it. Misuse-based detection approach explicitly defines the attack behavior and classifies all events matching these specifications as attack. Data processing techniques for intrusion detection systems are also presented.
引用
收藏
页码:181 / 186
页数:6
相关论文
共 50 条
  • [31] Survey of intrusion detection systems: techniques, datasets and challenges
    Ansam Khraisat
    Iqbal Gondal
    Peter Vamplew
    Joarder Kamruzzaman
    [J]. Cybersecurity, 2
  • [32] Survey of intrusion detection systems: techniques, datasets and challenges
    Khraisat, Ansam
    Gondal, Iqbal
    Vamplew, Peter
    Kamruzzaman, Joarder
    [J]. CYBERSECURITY, 2019, 2 (01)
  • [33] Enhancing Intrusion Detection Systems with Reinforcement Learning: A Comprehensive Survey of RL-based Approaches and Techniques
    Faten Louati
    Farah Barika Ktata
    Ikram Amous
    [J]. SN Computer Science, 5 (6)
  • [34] Less is More:Data Processing with SVM for Intrusion Detection
    肖海军
    洪帆
    王玲
    [J]. Railway Engineering Science, 2009, 17 (01) : 9 - 15
  • [35] Immune algorithms based on data processing in intrusion detection
    Zhang, Yufang
    Xiong, Zhongyang
    Chen, Yan
    Li, Guangyong
    Geng, Xiaofei
    [J]. Journal of Computational Information Systems, 2008, 4 (01): : 293 - 300
  • [36] Intrusion Detection Systems in MANETs using Hybrid Techniques
    Joshi, Vaishnavi Bheemarao
    Goudar, R. H.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 534 - 538
  • [37] Incorporating soft computing techniques for intrusion detection systems
    Yu, Yingbing
    Patel, Sandip C.
    [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 1 - 5
  • [38] Studying Machine Learning Techniques for Intrusion Detection Systems
    Quang-Vinh Dang
    [J]. FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019), 2019, 11814 : 411 - 426
  • [39] Signal Processing Applications in Network Intrusion Detection Systems
    Huang, Chin-Tser
    Chang, Rocky K. C.
    Huang, Polly
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [40] Signal Processing Applications in Network Intrusion Detection Systems
    Chin-Tser Huang
    Rocky K.C. Chang
    Polly Huang
    [J]. EURASIP Journal on Advances in Signal Processing, 2009