CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Recent Advances in Intrusion Detection Systems: An Analytical Evaluation and Comparative Study

by Ashish Kumar, Srikant Chandak, Rita Dewanjee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 4
Year of Publication: 2014
Authors: Ashish Kumar, Srikant Chandak, Rita Dewanjee
10.5120/14975-3172

Ashish Kumar, Srikant Chandak, Rita Dewanjee . Recent Advances in Intrusion Detection Systems: An Analytical Evaluation and Comparative Study. International Journal of Computer Applications. 86, 4 ( January 2014), 32-37. DOI=10.5120/14975-3172

@article{ 10.5120/14975-3172,
author = { Ashish Kumar, Srikant Chandak, Rita Dewanjee },
title = { Recent Advances in Intrusion Detection Systems: An Analytical Evaluation and Comparative Study },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 4 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number4/14975-3172/ },
doi = { 10.5120/14975-3172 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:26.919020+05:30
%A Ashish Kumar
%A Srikant Chandak
%A Rita Dewanjee
%T Recent Advances in Intrusion Detection Systems: An Analytical Evaluation and Comparative Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 4
%P 32-37
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As the emergence of computer, the use and effect of internet in our daily life is increased day by day. Security has become the greatest problem within and outside the organizations. User ID, passwords and firewalls are the common steps that organizations take to secure their computers. However, these are not so effective mediums in current context of unsecure eon. Intruders and attackers are so advanced that they access the computer and manipulate it, so they cannot be traced easily. Through this contribution objective is to find out & present existing intrusion detection system (IDS) with their pros and cons that will be helpful to select the best one.

References
  1. Fagg, C. R. 2001. Intrusion Detection Systems: Definition, Need and Challenges. White Paper. SANS Institute InfoSec Reading Room.
  2. Axelsson, S. March 2000. Intrusion Detection Systems: A Survey and Taxonomy. Technical Report. Chalmers University, Sweden.
  3. Sobirey, M. November 1999. Michael Sobirey's Intrusion Detection Systems page. http://www-rnks. informatik. tu-cottbus. de/~sobirey/ids. html.
  4. Timberline Technologies LLC. Alphabetical List of Intrusion Detection Products. http://www. timberlinetechnologies. com/products/intrusiondtct. html, [Last Updated 2009].
  5. Boyce, C. A. P. and Zincir-Heywood, A. N. October 2003. A Comparison of Four Intrusion Detection Systems for Secure E-Business. In Proceedings of the 6th International Conference on Electronic Commerce Research (ICECR03), ATSMA, IFIP, Dallas, USA.
  6. Varadarajan, G. K. October 2012. Web application attack analysis using bro ids. White Paper. SANS Institute InfoSec Reading Room.
  7. White, J. S. Fitzsimmonsb, T. and Matthews J. Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata. In Proceedings of the SPIE, Cyber Sensing 2012
  8. Roesch, M. 1997. Snort – Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA'99 USA. November 1999.
  9. Inc. Network Flight Recorder. http://www. nfr. com, 1997
  10. Lee, W. Park, C. and Stolfo, S. 1999. Automated Intrusion Detection using NFR: Methods and Experiences. USENIX Intrusion Detection Workshop. California, USA.
  11. Undy, M. and Antonelli, C. J. 1998. Sifting the Network: Performing Packet Triage with NFR. CITI Technical Report 98?6. Center for Information Technology Integration, University of Michigan, USA.
  12. http://suricata-ids. org/features/all-features [last visited: 02/12/2013]
  13. Albin, E. 2011. A Comparative analysis of the Snort and Suricata Intrusion Detection Systems. Master's Thesis, Naval Postgraduate School, Monterey, California, USA.
  14. Neumann, P. G. 1990. A Comparative Anatomy of Computer System/Network Anomaly Detection Systems, CSL, SRI BN-168, Menlo Park, CA, USA.
  15. Enterasys Networks. http://www. voxtechnologies. com/enterasys_files/pdf/overview-datasheet. pdf [last visited: 04/12/2013]
  16. BackTrack Linux. Available at: http://www. backtrack-linux. org
  17. Wire Shark Packet Analyzer. Available at: http://www. wireshark. org
  18. Social-Engineer Toolkit (SET). Available at: https://www. trustedsec. com/?
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Intrusion Detection Intrusion Prevention Social Engineerimg Toolkit.