CFP last date
20 May 2024
Reseach Article

Hybrid Intrusion Detection System: Technology and Development

by Megha Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 9
Year of Publication: 2015
Authors: Megha Gupta
10.5120/20177-2384

Megha Gupta . Hybrid Intrusion Detection System: Technology and Development. International Journal of Computer Applications. 115, 9 ( April 2015), 5-8. DOI=10.5120/20177-2384

@article{ 10.5120/20177-2384,
author = { Megha Gupta },
title = { Hybrid Intrusion Detection System: Technology and Development },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 9 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number9/20177-2384/ },
doi = { 10.5120/20177-2384 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:20.127412+05:30
%A Megha Gupta
%T Hybrid Intrusion Detection System: Technology and Development
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 9
%P 5-8
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In current scenario most of the intrusion detection systems (IDS) use one of the two detection methods, misused detection or Anomaly detection?both of them have their own limitations. Technology has developed the technique that combines misuse detection system with anomaly detection system (ADS) or network intrusion detection system and host-based intrusion detection system is known as hybrid intrusion detection . The aim is to increase the detection rate and decrease the false positive rate by the use of misuse detection and anomaly detection. A review on the hybrid IDS is shown in this paper. It shows several main aspects of hybrid Ids and also reviewed some major research in IDS using hybrid approach. A comparative study of performance criterions of different research is also shown in this paper.

References
  1. YU-XINDING, MINXIAO, AI-wuliu"research and implementation on snort- based hybrid intrusion detection" Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009
  2. K. Q. Yan, S. C. Wang, S. S. Wang and C. W. Liu "Hybrid Intrusion Detection System for Enhancing the Security of a Cluster-based Wireless Sensor" 978-1-4244-5540-9/10/$26. 00 ©2010 IEEE.
  3. Yubeinbai, hidestunekobayashi"intrusion detection systems: technology and development "proceedings of 17th international conference on advance information networking and applications (AINA'03)2003IEEE
  4. Z. Muda, W. Yassin, M. N. Suleiman, N. I. Udzir "Intrusion Detection based on K-Means Clustering and Naïve Bayes Classification" 2011 7th International Conference on IT in Asia (CITA)
  5. Rangadurai Karthick, Vipul P. Hattiwale ,BalaramanRavindran"Adaptive Network Intrusion Detection System using a Hybrid Approach" 978-1-4673-0298-2/12/$31. 00 ?c 2012 IEEE
  6. Cristina Amza, C?at?alinLeordeanu, ValentinCristea "Hybrid Network Intrusion Detection" 978-1-4577-1481-8/11/$26. 00 ©2011 IEEE
  7. Harley Kozushko "Intrusion Detection: Host-Based andNetwork-Based IntrusionDetectionSystems"DuanyangZhao,QingXiangXu,Zhilinfeng"analysis and design for intrusion detection system based on data mining"978-0-7695-3987-4/10$26. 002010IEE
  8. Earl Carter"intrusion detection system"article by cisco press.
  9. Vijayasarathy, R. , Ravindran, B. andRaghavan, S. V. , A system approach tonetworkmodeling for DDoS detection using a Naive Bayesian classifier,COMSNETS, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

IDS HIDS NIDS K-Means Naive –Bayes.