A Review on Network Intrusion Detection System

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-9                      
Year of Publication : 2013
Authors : Preeti Yadav , Divakar Singh

Citation 

Preeti Yadav , Divakar Singh. "A Review on Network Intrusion Detection System". International Journal of Engineering Trends and Technology (IJETT). V4(9):3842-3847 Sep 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

Internet and computer networks are exposed to an increasing number of security threats . For new types of attacks are emerging constantly, developing flexibility and adaptability safety - oriented approaches is a serious problem. In this context, the anomaly - based network Intrusion detection techniques are valuable technology to protect the target systems and networks against malicious activities. However, despite a number of these methods described in the literature in recent years, security tools comprising detecting anomalies function is only beginning to emerge, and several important issues remain to be solved. This paper begins with the review of the best - known anomaly - based intrusion detection techniques. Then the available platforms, systems development and research projects are presented. Finally, the main issues ar e addressed for large deployments, anomaly - based detectors disruption, with special emphasis on the evaluation questions.

References

[1] J. Balthrop. Personal communication, November 2004.
[2] J. Balthrop, F. Esponda, S. Forrest, and M. Glickman. Coverage and generaliszation in an artificial immune system. Proceedings of GECCO, pages 3 - 10, 2002.
[3] J. Balthrop, S. Forrest, and M. Glickman. Revisiting lisys: Parameters and normal behaviour. Proceedings of the Congress on Evolutionary Computation , pages 1045 - 1050, 2002.
[4] K. Begnum and M. Burgess. A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine). Integrated Network Management, pages 31 - 42, 2003.
[5] P. Bentley, J. Greensmith, and S.Ujin. Two ways to grow tissue for artificial immune systems. In C. Jacob, M. J. Pilat, P. J.Bentley, and J. Timmis, editors, Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS - 2005), volume 3627 of Lecture Notes in Computer Sc ience, pages 139 - 152, Banff, Alberta, Canada, August 2005. Springer.
[6] C. L. Blake and C. J. Merz. Uci repository of machine learning databases. http://www.ics.uci.edu/mlearn/MLRepository.h tml, 1998. Irvine, CA: University of California, De partment of Information and Computer Science.
[7] U. Aickelin, J. Greensmith and J. Twycross “Immune System Approaches to Intrusion Detection - A Review”. In Proceedings ICARIS - 2004, 3rd International Conference on Artificial Immune Systems, LNCS 3239, pp 316 - 329, Springer - Verlag, Catania, Italy. 2004.
[8] U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod. Danger theory: The link between ais and ids. In Proc. of the Second Internation Conference on Artificial Immune Systems (ICARIS - 03), pages 147 - 155, 2003.
[9] U. Aickelin and S. Cayzer. The danger theory and its application to ais. In J. Timmis and P. J. Bentley, editors, Proceeding of the First International Conference on Artificial Immune System (ICARIS - 2002), pages 141 - 148, University of Kent at Canterbury, U.K., Sep. 2002. University of Kent at Canterbury Printing Unit.
[10] S. Axelsson. Intrusion detection systems: A survey and taxonomy. Technical Report No 99 - 15, Chalmers University of Technology, Sweden, 1999.
[11] M. Ayara, J. Timmis, R. de Lemos, L. N. de Castro, and R. Duncan. Negative selection: How to generate detectors. In J. Timmis and P. Bentley, editors, Proceedings of the 1st International Conference
[12] S. Devaraju, S. Ramakrishnan “DETECTION OF ACCURACY FOR INTRUSION DETECTION SYSTEM USING NEURAL NETWORK CLASSIFIER”, International Journal of Emerging Technology and Advanced Engineering Volume 3, Special Issue 1, January 2013 .
[13] Razieh Baradaran and Mahdieh HajiMohammadHosseini “Intrusion Detection System based on Support Vector Machine and BN - KDD Data Set”, 7thSASTech 2013, Iran, Bandar - Abbas. 7 - 8 March, 2013 .
[14] Sreeja M. S. , Aarcha Anoop ‘New Genetic Algorithm Based Intrusion Detection Syste m for SCADA”, International Journal of Engineering Innovation & Research Volume 2, Issue 2, ISSN: 2277 – 5668.
[15] Megha Bandgar, Komal dhurve, Sneha Jadhav,Vicky Kayastha,Prof. T.J Parvat “Intrusion Detection System using Hidden Markov Model (HMM)”, IOSR Journal of Computer Engineering (IOSR - JCE) e - ISSN: 2278 - 0661, p - ISSN: 2278 - 8727Volume 10, Issue 3 (Mar. - Apr. 2013), PP 66 - 70.
[16] Alma Cemerlic, Li Yang, Joseph M. Kizza “ Network Intrusion Detection Based on Bayesian Networks ”, University of Tennessee at Chattanooga Chattanooga, TN 37403.
[17] S.A.Joshi, Varsha S.Pimprale “Network Intrusion Detection System (NIDS) based on Data Mining”, International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 1, January 2013.
[18] BHARANIDHARAN SHANMUGAM NORBIK BASHAH IDRIS “ Anomaly Intrusion Detection based on Fuzzy Logic and Data Mining ”, Proceedings of the Postgraduate Annual Research Seminar 2006 .

Keywords
Networks, Security, Intrusion Detection Systems .