• Corpus ID: 212537594

Current Trends and Approaches of Network Intrusion Detection System

  title={Current Trends and Approaches of Network Intrusion Detection System},
  author={Ankit Punia and Ved Ratan},
The significance of system security has grown very rapidly; there are many devices which have made aware of the protection required in a network. Network Intrusion Detection Systems (NIDS) are the most broadly conveyed systems. Since new threats are possibly more harmful, various master dynamic plans are required. These frameworks finish the assigned task by making a profile of normal internet traffic node. Then, afterward utilizing this profile to ceaselessly screen the system action for… 
An Intrusion Detection System for Network Security Based on an Advanced Honeypots Server
  • K. Veena, K. Meena
  • Computer Science
    International journal of simulation: systems, science & technology
  • 2018
To improve the security performance to protect the network from intruders, an advanced honeypot based Intrusion Detection technique is used to detect and analyze threats to ensure security.


Survey of Current Network Intrusion Detection Techniques
This Survey paper will evaluate a number of current NIDS systems and the algorithms they employ to detect and combat security threats, both from technical and economical perspective.
NIST Special Publication on Intrusion Detection Systems
This guidance document is intended as a primer in intrusion detection, developed for those who need to understand what security goals intrusion detection mechanisms serve, how to select and configure intrusion detection systems for their specific system and network environments, and how to integrate intrusion detection functions with the rest of the organizational security infrastructure.
Bayesian event classification for intrusion detection
Experimental results show that the accuracy of the event classification process is significantly improved using the proposed Bayesian networks, which improve the aggregation of different model outputs and allow one to seamlessly incorporate additional information.
Adaptive, Model-Based Monitoring for Cyber Attack Detection
A high-performance, adaptive, model-based technique for attack detection, using Bayes net technology to analyze bursts of traffic, which has the attractive features of both signature based and statistical techniques: model specificity, adaptability, and generalization potential.
Mining anomalies using traffic feature distributions
It is argued that the distributions of packet features observed in flow traces reveals both the presence and the structure of a wide range of anomalies, and that using feature distributions, anomalies naturally fall into distinct and meaningful clusters that can be used to automatically classify anomalies and to uncover new anomaly types.
Automatically inferring patterns of resource consumption in network traffic
A new method of traffic characterization that automatically groups traffic into minimal clusters of conspicuous consumption that can be used to automatically classify new traffic patterns, such as network worms or peer-to-peer applications, without knowing the structure of such traffic a priori.
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
This paper introduces a new representation for regular expressions, called the Delayed Input DFA (D2FA), which substantially reduces space equirements as compared to a DFA, and describes an efficient architecture that can perform deep packet inspection at multi-gigabit rates.
Security in Wireless Ad Hoc Networks
  • Hongmei Deng, D. Agrawal
  • History, Business
    Handbook of Algorithms for Wireless Networking and Mobile Computing
  • 2005
If you get the printed book in on-line book store, you may also find the same problem, but here, you can easily find and get this security for wireless ad hoc networks by reading this site.
The Future of IDS