• Corpus ID: 7504589

Importance of Intrusion Detection System ( IDS )

@inproceedings{Ashoor2010ImportanceOI,
  title={Importance of Intrusion Detection System ( IDS )},
  author={Asmaa Shaker Ashoor},
  year={2010}
}
Intruders computers, who are spread across the Internet have become a major threat in our world, The researchers proposed a number of techniques such as (firewall, encryption) to prevent such penetration and protect the infrastructure of computers, but with this, the intruders managed to penetrate the computers. IDS has taken much of the attention of researchers, IDS monitors the resources computer and sends reports on the activities of any anomaly or strange patterns The aim of this paper is… 

Figures from this paper

Proposed Multi-Layers Intrusion Detection System ( MLIDS ) Model
TLDR
This paper has proposed multi layer intrusion detection technique (MLIDS) model that can effectively and efficiently detect the attacks that are similar to DOS, R2L, U2R, and many more.
A ROLE OF INTRUSION DETECTION SYSTEM FOR WIRELESS LAN USING VARIOUS SCHEMES AND RELATED ISSUES
TLDR
This study assesses different kinds of IDS and inclines preemptive procedures, software which has complete competencies of an intrusion detection system and it can endeavor to stop probable events.
OPTIMIZATION ALGORITHMS FOR INTRUSION DETECTION SYSTEM: A REVIEW
TLDR
This paper is a survey which tries to covers some of the optimization algorithms used in the field of intrusion detection in past ten years such as Artificial Bee Colony (ABC), Genetic Algorithm, Cuttlefish Algorithms (CFA), and Particle Swarm Optimization (PSO).
Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS)
TLDR
The experimental results showed that the proposed multi-layer model using C5 decision tree achieves higher classification rate accuracy, and less false alarm rate.
Erroneous Classified Attack: A Time-Bomb
TLDR
A proposed system which performs well when compare to other IDS is provided and a comparative study of strong and weak points with other system on the attack detection rate of these existing classification techniques is introduced.
A System to automate the development of anomaly-based network intrusion detection model
TLDR
It is verified that Artificial Neural Network (ANN) based machine learning with wrapper feature selection outperforms support vector machine (SVM) technique while classifying network traffic as harmful or harmless.
A Proposed Intrusion Detection System
TLDR
The proposed model of hybrid IDSs offers several advantages over alternative systems, first of all it provided higher security, it supported high availability and scalability, and most important thing it produced good results in terms of normal and abnormal behaviors of captured packet.
Survey of Network Intrusion Detection Using K-Mean Algorithm
TLDR
Intrusion detection is the proceed of detecting proceedings that attempt to cooperate the confidentiality, integrity or availability of a resource in Information Security, and plays a particularly significant role in attack detection, security check and network inspect.
Research on Network Intrusion Detection Technology Based on Network Security
TLDR
It is proved that the intrusion detection technology based on support vector machine can effectively solve the problem of self learning and small sample of network intrusion detection.
Study on Decision Tree and KNN Algorithm for Intrusion Detection System
TLDR
This paper focuses on implementing machine learning techniques Decision Tree and KNN on IDS and evaluates the performance of both the techniques based on their accuracy.
...
...

References

SHOWING 1-9 OF 9 REFERENCES
Evolution of Intrusion Detection Systems
TLDR
The challenges in designing efficient intrusion detection systems which could provide high accuracy, low false alarm rate and reduced number of features are presented and some of the computational intelligence paradigms could be used in designing intrusion Detection systems in a distributed environment.
An Intrusion-Detection Model
  • D. Denning
  • Computer Science
    IEEE Transactions on Software Engineering
  • 1987
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that
A network security monitor
TLDR
Initial results demonstrate that many network attacks are detectable with the authors' monitor, although it can be defeated.
Intrusion Detection : Host-Based and Network-Based Intrusion Detection Systems
Get intrusion detection for your network that enables you to inspect traffic Catch threats targeting your vulnerable systems with signaturebased anomaly detection Host-based Intrusion Detection
Tetrad, “The Evolution of Intrusion Detection Systems
  • Digital International Journal of Scientific Engineering Research,
  • 2001
An intrusiondetection model.
  • IEEE Transactions on Software Engineering,
  • 1987
etal . " A Network Security Monitor
    Computer Security Threat Monitoring and Surveillance
    • 1980
    Computer Security Threat Monitoring and Surveillance”,Fort
    • 1980