A survey of intrusion detection techniques

  title={A survey of intrusion detection techniques},
  author={Sharanya Chandran and K. Senthil Kumar},
  journal={International journal of engineering and technology},
  • S. Chandran, K. S. Kumar
  • Published 10 March 2018
  • Computer Science
  • International journal of engineering and technology
In today’s world, the number of companies is increasing day by day that help end users to express opinion i.e. social media management, to watch news, payment applications, retail, ecommerce etc. There are large amount of forms, which take personal information’s like username, password, social security number, credit card, debit card and account information. Thus the applications are vulnerable to security issues like phishing attacks, denial of service attacks, cross-site scripting attack and… 
Q-Learning for Securing Cyber-Physical Systems : A survey
  • Montdher Alabadi, Zafer Albayrak
  • Computer Science
    2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
  • 2020
This paper provides a survey of the recent works that utilized the Q-Learning algorithm in terms of security enabling and privacy-preserving and classified and analyzed the state-of-the-art of Q-learning and CPS systems.


Detecting Web Attacks Using Multi-stage Log Analysis
The proposed multi-stage log analysis architecture uses logs generated by the application during attacks to effectively detect attacks and to help preventing future attacks, and would be highly applicable to many intrusion detection applications.
XSS vulnerability assessment and prevention in web application
In this paper, the focus is on injection, detection, and prevention of stored based XSS reflected XSS and DOM basedXSS, which are the most dangerous attacks against cross-site scripting.
An Attack Pattern Framework for Monitoring Enterprise Information Systems
An attack pattern framework for EIS is proposed that enables an appIDS, such as SAP Enterprise Threat Detection (ETD) [1], to perform log analysis simultaneously from multiple sources and provides an attack pattern specification language and associated methodology for managing attack pattern lifecycle and appropriate alert mitigation response.
Introspective Intrusion Detection
Introspective Intrusion Detection (IID) combines the advantages of traditional intrusion detection and CFI by distinguishing anomalies in execution without making absolute judgments about malicious intent.
BogusBiter: A transparent protection against phishing attacks
BogusBiter is a unique client-side anti-phishing tool, which transparently feeds a relatively large number of bogus credentials into a suspected phishing site, and enables a legitimate Web site to identify stolen credentials in a timely manner.
New malware detection framework based on N-grams and Support Vector Domain Description
A new framework to detect new malicious programs, based on N-grams and an improved version of Support Vector Domain Description is presented, which is generally regarded as ineffective against attacks like code polymorphism and metamorphism used by malware writers to obfuscate their code.
Detecting and mitigating denial of service attacks against the data plane in software defined networks
This work discusses Denial of Service attacks against the data plane and their impact, and proposes a tailored statistical detection approach as well as a lightweight countermeasure to mitigate attacks in a lightweight and dependable way.
Research on the Performance of Mining Packets of Educational Network for Malware Detection between PM and VM
This paper does a series of experiments to test performance of data mining algorithm based on Hadoop in physical machines and virtual machines and finds that the performance ofdata mining algorithm depends on disk I/O performance ofHadoop.
SECO: SDN sEcure COntroller algorithm for detecting and defending denial of service attacks
SDN sEcure COntroller (SECO) a novel and simple detect and defense algorithm, running in the controller, for improving SDN security features under Denial of Service (DoS) attacks is introduced.
Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience
Hamsa is proposed, a network-based automated signature generation system for polymorphic worms which is fast, noise-tolerant and attack-resilient, and significantly outperforms Polygraph in terms of efficiency, accuracy, and attack resilience.