Intrusion Detection Techniques

  • A. Vikramajit Department of Computers and Technology Sri Manakula Vinayagar Engineering College, India
  • N. Adithya khanna Department of Computers and Technology Sri Manakula Vinayagar Engineering College, India

Abstract

Network security has been one of the most important problems in Computer Network Management and Intrusion is the most publicized threats to security. In recent years, intrusion detection has emerged as an important field for network security. IDSs obtain better results when each class of attacks is treated as a separate problem and handled by specialized algorithms. Now in days various model and method are available for intrusion detection. In this paper, we present a study of intrusion detection. Detection method to improve the detection rate & helping the users to develop secure information systems.

References

[1] Christopher Kruegel, Fredrik Valeur, and Giovanni Vigna. “Intrusion Detection and Correlation: Challenges and Solutions”, volume 14 of Advances in Information Security. Springer- Verlag, 2005
[2] R. A. Kemmerer and G. Vigna, “ Intrusion detection: A brief history and overview”,IEEE Security and Privacy, April 2002
[3] Sandeep Kumar, Eugene H.Spat'tord, "An Application of Pattern Matching in Intrusion Detection", Technical Report 94-0 13, Department of © 20 1 1 lET 228 Computer Sciences, Purdue University, West Lafayette, March 2004.
[4] Sandeep Kumar, Eugene H.Spat'tord, "A Pattern Matching Model for Misuse Intrusion Detection", The COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907- 1 398.
[5] Gonzalo Navarro, Mathieu Raffinot, "Flexible Pattern Matching in Strings", Cambridge University Press 2002, ISBN 0-52 1-8 13077.
[6] John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson, "Fuzzy Intrusion Detection", Electrical and Computer Engineering Department, Iowa State University, Ames, lA, USA.
[7] K.e.C.Chan and W.H.Au, "Mining Fuzzy Association Rules", Proc.Of ACM CIKM, 1997, pp.209- 2 15.
[8] Spector, James P Anderson, “Computer Security Threat Monitoring and Surveillance”, Fort Washington, PA, 1980.
[9] JIAO Licheng Jiao, Fang Liu, and Jing Liu, “Intelligent Data Mining and Knowledge Discovery”, Xi’an: Xidian University Press,2006,pp.325-326.
[10] Yang Jian, “An Improved Intrusion Detection Algorithm Based on DBSCAN”, Micro Computer Information, 25,1008-0570(2009)01- 3-0058-03, 58-60,2009.

[11] C.F. Tsai, C.Y. Lin, “A triangle area based nearest neighbors approach to intrusion detection”, Pattern Recognition 43(1) 222-229, 2010.
[12] S.Peddabachigari,A.Abraham,c.Grosan,J.Thomas, “modeling intrusion detection system using hybrid intelligent system”,Journal of Network and Computer Applications 30 114-132, 2007.
[13] C. Xiang, P.C. Yong, L.S. Meng, “Design of multiple level hybrid classifierfor intrusion detection system using bayesian clustering and decision tree”, Pattern Recognition Letters 29 918-924,2008.
[14] Sanoop Mallissery , Jeevan Prabhu,and Raghavendra Ganiga, “Survey on intrusion detection method”,2011.
[15] Deepthy K Denatious & 2Anita John, “Survey on Data Mining Techniques to Enhance Intrusion Detection”,2012.
[16] Changxin Song, Ke Ma Institute of Computer Information & Technology of Qinghai Normal University Network Center of Qinghai Normal University Qinghai, China., “Design of Intrusion Detection System Based on Data Mining Algorithm”,2009.
[17] Li Tian1, Wang Jianwen1 Department of Computer Science, North China Electric Power University (NCEPU), Baoding 071003, China, “Research on Network Intrusion Detection System Based on Improved K-means Clustering Algorithm”,2009
[18] Li Xue-yong, Gao Guo- “A New Intrusion Detection Method Based on Improved DBSCAN”,2010.
[19] Z. Muda, W. Yassin, M.N. Sulaiman and N.I.Udzir, “Intrusion Detection based on K-Means Clustering andOneR Classification”,2011. Zhou Mingqiang,HuangHui,WangQian, “A Graph-based Clustering Algorithm for Anomaly Intrusion Detection”, 2012
Published
2017-12-13
How to Cite
VIKRAMAJIT, A.; KHANNA, N. Adithya. Intrusion Detection Techniques. Universal Journal of Computers & Technology, [S.l.], v. 2, n. 2, p. 189-195, dec. 2017. ISSN 2456-2955. Available at: <http://uproonline.com/index.php/UJCT/article/view/63>. Date accessed: 17 aug. 2018.
Section
Articles

Keywords

Clustering, data mining, intrusion detection system, network security