Corpus ID: 7504589

Importance of Intrusion Detection System ( IDS )

@inproceedings{Ashoor2010ImportanceOI,
  title={Importance of Intrusion Detection System ( IDS )},
  author={Asmaa Shaker Ashoor},
  year={2010}
}
Intruders computers, who are spread across the Internet have become a major threat in our world, The researchers proposed a number of techniques such as (firewall, encryption) to prevent such penetration and protect the infrastructure of computers, but with this, the intruders managed to penetrate the computers. IDS has taken much of the attention of researchers, IDS monitors the resources computer and sends reports on the activities of any anomaly or strange patterns The aim of this paper is… Expand
Proposed Multi-Layers Intrusion Detection System ( MLIDS ) Model
In the Digital world security is the primary concerned. Today, most discussions on computer security is centered on the tools or techniques used in protecting and defending networks. In recentlyExpand
A ROLE OF INTRUSION DETECTION SYSTEM FOR WIRELESS LAN USING VARIOUS SCHEMES AND RELATED ISSUES
The advancement in network based technology and augmented dependability of our everyday life on this technology. During recent years, number of attacks on networks has intensely increased. HenceExpand
OPTIMIZATION ALGORITHMS FOR INTRUSION DETECTION SYSTEM: A REVIEW
TLDR
This paper is a survey which tries to covers some of the optimization algorithms used in the field of intrusion detection in past ten years such as Artificial Bee Colony (ABC), Genetic Algorithm, Cuttlefish Algorithms (CFA), and Particle Swarm Optimization (PSO). Expand
Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS)
TLDR
The experimental results showed that the proposed multi-layer model using C5 decision tree achieves higher classification rate accuracy, and less false alarm rate. Expand
Erroneous Classified Attack: A Time-Bomb
TLDR
A proposed system which performs well when compare to other IDS is provided and a comparative study of strong and weak points with other system on the attack detection rate of these existing classification techniques is introduced. Expand
A Proposed Intrusion Detection System
This paper titled “Proposed Intrusion Detection System” is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Here weExpand
Survey of Network Intrusion Detection Using K-Mean Algorithm
Intrusion Detection System (IDS) due to novel attack method or upgraded. Because many current IDSs are constructing by point instruction of professional knowledge, changes to IDSs are costly andExpand
Research on Network Intrusion Detection Technology Based on Network Security
Objective: this article addresses the serious network security problems caused by the rapid development of the Internet technology. Method: the security measures such as firewall and other securityExpand
Study on Decision Tree and KNN Algorithm for Intrusion Detection System
TLDR
This paper focuses on implementing machine learning techniques Decision Tree and KNN on IDS and evaluates the performance of both the techniques based on their accuracy. Expand
Intrusion Detection and Prevention Systems (IDPS) and Security Issues
Technical solutions, introduced by policies and implantations are essential requirements of an information security program. Advanced technologies such as intrusion detection and prevention systemExpand
...
1
2
3
4
5
...

References

SHOWING 1-9 OF 9 REFERENCES
Evolution of Intrusion Detection Systems
Several information security techniques are available today to protect information systems against unauthorized use, duplication, alteration, destruction and virus attacks. An Intrusion DetectionExpand
An Intrusion-Detection Model
  • D. Denning
  • Computer Science
  • IEEE Transactions on Software Engineering
  • 1987
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis thatExpand
A network security monitor
TLDR
Initial results demonstrate that many network attacks are detectable with the authors' monitor, although it can be defeated. Expand
Intrusion Detection : Host-Based and Network-Based Intrusion Detection Systems
Get intrusion detection for your network that enables you to inspect traffic Catch threats targeting your vulnerable systems with signaturebased anomaly detection Host-based Intrusion DetectionExpand
Tetrad, “The Evolution of Intrusion Detection Systems
  • Digital International Journal of Scientific Engineering Research,
  • 2001
An intrusiondetection model.
  • IEEE Transactions on Software Engineering,
  • 1987
Computer Security Threat Monitoring and Surveillance
  • 1980
Computer Security Threat Monitoring and Surveillance”,Fort
  • 1980
etal . " A Network Security Monitor