CFP last date
20 June 2024
Reseach Article

Towards the Development of an Efficient Intrusion Detection System

by Samarjeet Borah, Anindita Chakraborty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 8
Year of Publication: 2014
Authors: Samarjeet Borah, Anindita Chakraborty
10.5120/15593-4314

Samarjeet Borah, Anindita Chakraborty . Towards the Development of an Efficient Intrusion Detection System. International Journal of Computer Applications. 90, 8 ( March 2014), 15-20. DOI=10.5120/15593-4314

@article{ 10.5120/15593-4314,
author = { Samarjeet Borah, Anindita Chakraborty },
title = { Towards the Development of an Efficient Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 8 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number8/15593-4314/ },
doi = { 10.5120/15593-4314 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:31.091410+05:30
%A Samarjeet Borah
%A Anindita Chakraborty
%T Towards the Development of an Efficient Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 8
%P 15-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion is a set of related activities which is performed to provide unauthorized activities such as access to the useful information, file modification etc. It is a set of any actions that attempt to compromise the integrity, confidentiality, or availability of a computer resource. Intrusion Detection Systems (IDS) are used to monitor and detect the probable attempts of such types. An IDS collects system and network activity related data. These data may contain network attacks against vulnerable services, data driven attacks on applications, host based attacks etc. There are several IDSs in literature proposed using various computational techniques such as statistical methods, artificial intelligence, data mining etc. Among these, data mining based methods are comparatively more successful in detecting unknown attack patterns. This paper reviews some remarkable works from the literature along with the basic concepts of intrusion detection. It also includes some suggestions for developing an efficient IDS based on the analysis carried out

References
  1. Nadya El Moussaid, Ahmed Toumanari, Maryam Elazhari, Intrusion Detection Based On Clustering Algorithm, International Journal of Electronics and Computer Science Engineering, Volume-2, Issue 3, ISSN-2277-1956, 2013
  2. Kopelo Letou, Dhruwajita Devi, Y. Jayanta Singh, Host Based Intrusion and Prevention System (HIDPS), International Journal of Computer Applications (0975 – 8887) Volume 69– No. 26, 2013.
  3. Manish Kumar, Dr. M. Hanumanthappa, Dr. T. V. Suresh Kumar, Intrusion Detection System- False Positive Alert Reduction Technique, ACEEE Int. J. on Network Security , Vol. 02, No. 03, 2011.
  4. Kusum Kumari Bharti, Sanyam Shukla, Sweta Jain, Intrusion Detection Using Clustering, IJCCT Vol-1 Issue 2, 3, 4; 2010 for International Conference on Advances in Computer, Communication Technology & Applications (ACCTA-2010).
  5. Mr. Vivek A. Patole, Mr. V. K. Pachghare, Dr. Parag Kulkarni, Self Organizing Maps to Build Intrusion Detection System, 2010 International Journal of Computer Applications (0975 – 8887) Volume 1 – No. 8
  6. Liberios Vokorokos, Anton Balaz, Martin Chovanec, Intrusion Detection System Using Self Organizing Map, Acta Electrotechnia et Informatica No. 1, Vol 6, ISSN 1335-8243, 2006.
  7. Peter Lichodzijewski, A. Nur Zincir-Heywood, Malcom I. Heywood, Host Based Intrusion Detection Using Self Organizing Maps, In the proceedings of the IEEE International Joint Conference on Neural Networks. IEEE 2002, pages- 1714-1719.
  8. Albert J. Hoglund, Kimmo Hatonen, Antti S. Sorvari, A Computer Host based User Anomaly Detection, System Using The Self Organizing Map, IJCNN 2000, Proceedings of the IEEE International Joint Conference on Neural Network, Volume-5, ISBN-0-7695-0619-4
  9. Self Organizing Map, URL: http://en. wikipedia. org/wiki/Self Organizing_map
  10. Clustering –Introduction, URL: http://home. deib. polimi. it/matteucc/Clustering /tutorial_html.
  11. Understanding Intrusion Detection technique, SANS Institute Info Sec Reading Room
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection system (IDS) Neural networks Self organizing map (SOM).