Approaches and Data Processing Techniques for Intrusion Detection Systems

被引:0
|
作者
Srinivasu, Pakkurthi [1 ]
Avadhani, P. S. [2 ]
Korimilli, Vishal [1 ]
Ravipati, Prudhvi [1 ]
机构
[1] Anil Neerukonda Inst Technol & Sci, Dept CSE, Sangivalasa, Andhra Pradesh, India
[2] Andhra Univ, Dept CS & SE, Coll Engn, Waltair, Andhra Pradesh, India
关键词
Intrusion Detection System; Type of attacks; Anomaly based intrusion detection; Misuse based intrusion detection; Network Security; Data Processing Techniques;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection systems (IDS). In this paper an overview of types of attacks, IDS components, and classifications of IDS is briefly given. Two approaches from the classification of IDS are also presented. They are anomaly-based detection and misuse-based detection. Anomaly-based detection approach is extremely powerful and novel tool which identifies anomalies as deviations from "normal" behavior and automatically detects any deviation from it. Misuse-based detection approach explicitly defines the attack behavior and classifies all events matching these specifications as attack. Data processing techniques for intrusion detection systems are also presented.
引用
收藏
页码:181 / 186
页数:6
相关论文
共 50 条
  • [41] Data fusion and network intrusion detection systems
    Ahmad, Rasheed
    Alsmadi, Izzat
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7493 - 7519
  • [42] Intrusion detection systems and multisensor data fusion
    Bass, T
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 99 - 105
  • [43] Hybrid Data Mining Approaches for Intrusion Detection in the Internet of Things
    Oreski, Dijana
    Androcec, Darko
    [J]. 2018 INTERNATIONAL CONFERENCE ON SMART SYSTEMS AND TECHNOLOGIES (SST), 2018, : 221 - 226
  • [44] DATABASE INTRUSION DETECTION USING SEQUENTIAL DATA MINING APPROACHES
    Abd Elaziz, Pakinam Elamein
    Sobh, Mohamed
    Mohamed, Hoda K.
    [J]. 2014 9TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2014, : 104 - 111
  • [45] Data mining approaches for signatures search in network intrusion detection
    Hu Zheng Bing
    Shirochin, V. P.
    [J]. 2005 IEEE INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2005, : 392 - 398
  • [46] A Modular Data Mining Architecture for Intrusion Detection Systems' Data
    Xynos, Konstantinos
    Blyth, Andrew
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 229 - 237
  • [47] Overview of Data Mining Based Adaptive Intrusion Detection Techniques
    Liu, Yangbin
    Shi, Liang
    Wang, Beizhan
    Wang, Panhong
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 702 - 706
  • [48] Network intrusion detection using data dimensions reduction techniques
    Shiravani, Anita
    Sadreddini, Mohammad Hadi
    Nahook, Hassan Nosrati
    [J]. JOURNAL OF BIG DATA, 2023, 10 (01)
  • [49] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques
    Haque, Mohd Junedul
    Magld, Khalid W.
    Hundewale, Nisar
    [J]. 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
  • [50] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES
    Shukran, Mohd Afizi Mohd
    Maskat, Kamaruzaman
    [J]. JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131