CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection System Methodologies Based on Data Analysis

by Dr.J.A.Chandulal, Dr.K.Nageswara Rao, Shaik Akbar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 2
Year of Publication: 2010
Authors: Dr.J.A.Chandulal, Dr.K.Nageswara Rao, Shaik Akbar
10.5120/892-1266

Dr.J.A.Chandulal, Dr.K.Nageswara Rao, Shaik Akbar . Intrusion Detection System Methodologies Based on Data Analysis. International Journal of Computer Applications. 5, 2 ( August 2010), 10-20. DOI=10.5120/892-1266

@article{ 10.5120/892-1266,
author = { Dr.J.A.Chandulal, Dr.K.Nageswara Rao, Shaik Akbar },
title = { Intrusion Detection System Methodologies Based on Data Analysis },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 2 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 10-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number2/892-1266/ },
doi = { 10.5120/892-1266 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:53:11.232745+05:30
%A Dr.J.A.Chandulal
%A Dr.K.Nageswara Rao
%A Shaik Akbar
%T Intrusion Detection System Methodologies Based on Data Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 2
%P 10-20
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapidly growing and wide spread use of computer networks the number of new threats has grown extensively. Intrusion and detection system can only identifying and protecting the attacks successfully. In this paper we focuses on detailed study of different types of attacks using in KDD99CUP Data Set and classification of IDS are also presented. They are Anomaly Detection System, Misuse Detection Systems. Different Data Analysis Methodologies also explained for IDS. To identify eleven data computing techniques associated with IDS are divided groups into categories. Some of those methods are based on computation such as Fuzzy logic and Bayesian networks, some are Artificial Intelligence such as Expert Systems, agents and neural networks some other are biological concepts such as Genetics and Immune systems.

References
  1. Anderson. J. P. “Computer Security Threat Monitoring and Surveillance.” Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980.
  2. Baiju Shah “How to Choose Intrusion Detection Solution” SANS Institute Resources, July 24, 2001.
  3. Danny Rozenblum “Understanding Intrusion Detection Systems” SANS Institute Resources, 2001.
  4. KDD Cup 1999 Data, Information and Computer Science,University of California, Irvine. http://kdd.ics.uci.edddatabases/kddcup99/kddcup99.html
  5. N. Srinivasan and V. Vaidehi. “Timed Coloured Petri Net Model for Misuse Intrusion Detection” First International Conference on Industrial and Information Systems, 8-11 Aug. 2006.
  6. Zirkle, L., “What is host-based intrusion detection? “Virginia Tech CNS. SANS Institute Resources, Intrusion Detection FAQ, Hyperlink ID FAQ, 2000.
  7. Northcutt, S. “What the Hackers Know about You. “SANS Institute. SANS Institute Resources, Intrusion Detection FAQ, Hyperlink: ID FAQ, 1999.
  8. Ong, T.H., C.P. Tan, Y.T. Tan, C.K. Chew, and C. Ting. “SNMS-Shadow Network Management System ”Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection, W. Lafayette, IN, 1999.
  9. Brenda McAnderson & Paul Ramstedt, “Intrusion Detection Technology: Today and Tomorrow”, November, 18, 1999.
  10. [Denning 1987] An Intrusion-detection Model / Denning, D. E. – p. 118, IEEE Symposium on Security and Privacy, 1986.
  11. M. Mehdi, S. Zair, A. Anou and M. Bensebti “A Bayesian Networks in Intrusion Detection Systems” Journal of Computer Science 3 (5): 259-265, 2007, ISSN 1549-3636.
  12. Ryan, Meng-Jang Lin and Risto Miikulainen “Intrusion Detection with Neural Networks”, In Advances in Neural Information Processing Systems 10, Cambridge, MA: MIT Press, 1998.
  13. Susan C. Lee and David V. Heinbuch “Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks”, In IEEE Transactions on systems, man and cybernetics – part A: systems and humans, vol. 31, no. 4, July 2001.
  14. Anup K. Ghost and Aaron Schwartzbaard “A study in Using Neural Networks for Anomaly and Misuse Detection.” In Pp. 141-152 of Proceedings of the 8th USENIX Security Symposium, Washington D.C, August 23-26, 1999.
  15. Theodoros Lapps and Konstantinos Pelechrinis “Data Mining Techniques for (Network) Intrusion Detection Systems” Department of Computer Science and Engineering UC Riverside, Riverside CA 92521.
  16. Fan W., Miller M., Stolfo S., Lee W., Chan P “Using Artificial Anomalies to Detect Unknown and Known Network Intrusions”, In Proceedings of the First IEEE International Conference on Data Mining, San Jose, CA, November 2001.
  17. Lee W., Stolfo S, Mok K. “Adaptive Intrusion Detection: a Data Mining Approach”, Artificial Intelligence Review, 14(6), pp. 533-567, December 2000.
  18. Bass T “Intrusion Detection Systems Multisensor Data Fusion: Creating Cyberspace Situational Awareness” Communication of the ACM, Vol. 43, Number 1, pp. 99-105, January 2000.
  19. Yao, J. T., S.L. Zhao, and L.V. Saxton, “ A study on fuzzy intrusion detection ”, Proceedings of SPIE Vol. 5812, Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, , Orlando, Florida, USA .,28 March - 1 April 2005.
  20. Gomez, J., and D. Dasgupta. "Evolving Fuzzy Classifiers for Intrusion Detection.", Proceedings of the 2002 IEEE, Workshop on Information Assurance, United States Military Academy, West Point, NY., June 2001.
  21. Bobor, V. "Efficient Intrusion Detection System Architecture Based on Neural Networks and Genetic Algorithms.", Department of Computer and Systems Sciences, Stockholm University / Royal Institute of Technology, KTH/DSV, 2006.
  22. R. Sekar, A. Gupta, J. Frullo, T. Hanbhag, A. Tiwari, H. Yang, and S. Zhou, “Specification-Based Anomaly Detection: a New Approach for Detecting”, International Journal of Network Security, Vol. 1, No.2, pp. 84–102, 2005.
  23. T. Peng, C. Leckie and K. Ramamohanarao, “Information Sharing for Distributed Intrusion Detection Systems”, Journal of Network and Computer Applications, Vol. [MAT02], No. 3, pp. 877-899, 2007.
  24. A. Pagnoni, and A. Visconti “An Innate Immune System for the Protection of Computer Networks”, ACM International Conference Proceeding Series, Vol. 92 archive Proceedings of the 4th international symposium on Information and communication technologies, 2005.
  25. F.Sabahi, IEEE Member, A.Movaghar, IEEE Senior Member “Intrusion Detection: A Survey” The Third International Conference on Systems and Networks Communications, IEEE, 2008.
  26. Theuns Verwoerd and Ray Hunt, “Intrusion Detection Techniques and Approaches”, Theuns Verwoerd and Ray Hunt, Department of Computer Science, University of Canterbury, New Zealand.
Index Terms

Computer Science
Information Sciences

Keywords

IDS KDD Data Set Anomaly Detection System Misuse Detection Data computing Techniques