CFP last date
20 May 2024
Reseach Article

Intrusion Detection and Prevention System: Issues and Challenges

by Bilal Maqbool Beigh, Uzair Bashir, Manzoor Chahcoo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 17
Year of Publication: 2013
Authors: Bilal Maqbool Beigh, Uzair Bashir, Manzoor Chahcoo
10.5120/13340-0701

Bilal Maqbool Beigh, Uzair Bashir, Manzoor Chahcoo . Intrusion Detection and Prevention System: Issues and Challenges. International Journal of Computer Applications. 76, 17 ( August 2013), 26-30. DOI=10.5120/13340-0701

@article{ 10.5120/13340-0701,
author = { Bilal Maqbool Beigh, Uzair Bashir, Manzoor Chahcoo },
title = { Intrusion Detection and Prevention System: Issues and Challenges },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 17 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number17/13340-0701/ },
doi = { 10.5120/13340-0701 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:48:41.042672+05:30
%A Bilal Maqbool Beigh
%A Uzair Bashir
%A Manzoor Chahcoo
%T Intrusion Detection and Prevention System: Issues and Challenges
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 17
%P 26-30
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In spite of the tremendous growth of technologies in computer networking and information technology, still we lack in preventing our resources from theft/attacks. This problem is very big as far as industry/ companies are concerned. As maximum of the organizations are facing an increasing number of threats every day in the form of viruses and attack etc. Since many different mechanisms were opted by organizations in the form of intrusion detection and prevention system to protect its organizations for these kinds of attacks, still there are many security breaches in every organization. In order to understand the security risks and IDPS, we will first survey about the common security breaches and then after discuss what are different opportunities and challenges in this particular field. In this paper we made a survey on the overall progress of intrusion detection systems. We survey the existing types, techniques and architectures of Intrusion Detection Systems in the literature. Finally we outline the present research challenges and issue.

References
  1. Abadeh, M. Saniee, Jafar Habibi, and Caro Lucas. "Intrusion detection using a fuzzy genetics-based learning algorithm. " Journal of Network and Computer Applications 30. 1 (2007): 414-428.
  2. Beigh, Bilal Maqbool, and M. A. Peer. "Intrusion Detection and Prevention System: Classification and Quick. " (2011).
  3. Bilal maqbool and M. A. Peer "frame work for choosing best intrusion detection and prevention system for an organization " appears in the Proc. of the Second Intl. Conf. on Advances in Computer, Electronics and Electrical Engineering -- CEEE 2013
  4. Mir, Suhail Qadir, S. M. K. Mehraj-ud-din Dar, and Bilal Maqbool Beig. "INFORMATION AVAILABILITY: COMPONENTS, THREATS AND PROTECTION MECHANISMS. " Journal of Global Research in Computer Science Journal of Global Research in Computer Science 2. 3 (2011).
  5. Bace, Rebecca, and Peter Mell. NIST special publication on intrusion detection systems. BOOZ-ALLEN AND HAMILTON INC MCLEAN VA, 2001.
  6. Garcia-Teodoro, Pedro, et al. "Anomaly-based network intrusion detection: Techniques, systems and challenges. " computers & security 28. 1 (2009): 18-28.
  7. Ning, Peng, and Sushil Jajodia. "Intrusion detection techniques. " The Internet Encyclopedia (2003).
  8. Stiawan, Deris, Mohd Idris, and Abdullah Hanan Abdullah. "Classification of Habitual Activities in Behavior-based Network Detection. " Journal of Computing 2. 8 (2010): 1-7.
  9. Dantu, Ram, Prakash Kolan, and Joao Cangussu. "Network risk management using attacker profiling. " Security and Communication Networks 2. 1 (2009): 83-96.
  10. Beigh, Bilal Maqbool, et al. "Performance Evaluation of Pro-Active Routing Protocols with Fading Models: An Empirical Evaluation using Ns-2. " International Journal of Engineering Science 3 (2011).
  11. Beigh, Bilal Maqbool, and M. A. Peer. "Performance evaluation of geographical routing protocols: An empirical study. " Computer Communication and Informatics (ICCCI), 2012 International Conference on. IEEE, 2012.
  12. IDRIS, MOHD YAZID, KAMARULNIZAM ABU BAKAR, and ABDUL HANAN ABDULLAH. "INTRUSION PREVENTION SYSTEM: A SURVEY. " (2005).
  13. Richharya, Vineet, et al. "Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques. " IJRCCT 2. 3 (2013): 126-130.
  14. Mell, Peter, et al. "An overview of issues in testing intrusion detection systems. " (2003).
  15. Puketza, Nicholas J. , et al. "A methodology for testing intrusion detection systems. " Software Engineering, IEEE Transactions on 22. 10 (1996): 719-729.
  16. Corona, Igino, Giorgio Giacinto, and Fabio Roli. "Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues. " Information Sciences (2013).
  17. Hoque, Mohammad Sazzadul, et al. "An implementation of intrusion detection system using Genetic Algorithm. " arXiv preprint arXiv:1204. 1336 (2012).
  18. Kandeeban, S. Selvakani, and Rengan S. Rajesh. "Integrated Intrusion detection system using soft computing. " International Journal of Network Security 10. 2 (2010): 87-92
Index Terms

Computer Science
Information Sciences

Keywords

Security IDPS Virus Attack Detection System Architecture Prevention Risk deployment IDS intrusion testing challenges