Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

An Examination of Network Intrusion Detection System Tools and Algorithms: A Review

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 95 - Number 6
Year of Publication: 2014
Jyoti Harbola
Kunwar Singh Vaisla
Aditya Harbola

Jyoti Harbola, Kunwar Singh Vaisla and Aditya Harbola. Article: An Examination of Network Intrusion Detection System Tools and Algorithms: A Review. International Journal of Computer Applications 95(6):32-35, June 2014. Full text available. BibTeX

	author = {Jyoti Harbola and Kunwar Singh Vaisla and Aditya Harbola},
	title = {Article: An Examination of Network Intrusion Detection System Tools and Algorithms: A Review},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {95},
	number = {6},
	pages = {32-35},
	month = {June},
	note = {Full text available}


Nowadays secured information communication has becoming at risk. Millions of users using the Internet at any instant of time and taking full use of the application's, services. DDoS flooding attacks are complex attempts to block the legitimate users. The Attacker normally gains access to a large number of computers by breaching their security loopholes and then they launch their attack to the target machine by these compromised machines. Intrusion Detection Systems have gained quick growth in command, scope and complexity. All IDS share an analogous primary structure: agents. Modern boost in malevolent network activity have hurried the need for IDS with global scope. A single IDS power can be grown by connecting an attack relationship engine with a database of events collected by distributed agents. This will help to provide global and single view of existing and rising attacks and will allow fast warning and ease development of countermeasures. A large number of distributed IDS with global and wide scope have been active for several years; three of these are discussed and compared with each other in this paper.


  • Aneetha, S. , Indhu, T. S. & Bose, S. (2012). Hybrid Network Intrusion Detection System Using Expert Rule Based Approach. Paper presented at the CCSEIT '12 Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology Pages 47-51,ACM New York, NY, USA ©2012
  • Casella, E. L. Lehmann and G. (1998). Theory of Point Estimation Springer Texts in Statistics Vol. 2nded. (pp. 590 p). doi:10. 1007/b98854
  • M. Sadeghi, F. Khosravi, K. Atefi, M. Barati. (2012). Security Analysis of Routing Protocols in Wireless Sensor Networks International Journal of Computer Science Issues, 9, 465-472
  • Carter, Earl. (2001). Cisco Secure Intrusion Detection System (Vol. 1). 800 East 96th Street, Indianapolis, Indiana 46240: Pearson Education, Cisco Press.
  • Yuebin Bail, Hidetsune Kobayashil ( March 27-29, 2003). Detection Systems: Technology and Development. Paper presented at the 17th International Conference on Advanced Information Networking and Applications (AINA'03), Xi'an, China.
  • Sharmila Devi, Ritu Nagpal. (2012). Intrusion Detection System Using Genetic Algorithm-A Review. International Journal of Computing & Business Research.
  • Whitley, Darrell. (1992). Foundations of Genetic Algorithms and Classifier. Morgan Kaufmann Publishers Inc. , 297-318.
  • Snort(software); http://en. wikipedia. org/ wiki/Snort_% 28 software%29
  • InfoWorld, The greatest open source software of all time, 2009; http://www. infoworld. com/d/open-source/greatest-open-source-software-all-time-776?source=fssr
  • SecTools. Org: Top 125 Network Security Tools; http:// sectools . org/tag/ids/
  • Sectools. Org: 2006 Results; http://sectools. org/tools 20 06. html
  • Houque,Mukit,Bikas"An mplementation of Intrusion Detection System Using Genetic Algorithm" IJNSA,Vol. 4, No. 2,March 2012
  • http://en. wikipedia. org/wiki/Support_vector_machine
  • Guggenberger, Andre. (2008). Another Introduction to Support Vector Machines. Retrieved from http://mindthegap. googlecode. com/files/ AnotherIntroductionSVM. pdf
  • P. Berkhin. A Survey of Clustering Data Mining Techniques. Grouping Multidimensional Data, p. 25–71, 2002
  • A. Abraham and R. Jain. Soft Computing Models for Network Intrusion Detection Systems. Classification and Clustering for Knowledge Discovery Studies in Computational Intelligence, p. 191–207, 2005
  • S. Abe. Support Vector Machines for pattern classification. London, Springer, 2005
  • N. Cristiani and J. Shawe-Taylor. An Introduction to Support Vector Machines and other kernel-based learning methods. Cambridge, Cambridge University Press, 2000.
  • D. H. Fisher. Knowledge Acquisition Via Incremental Conceptual Clustering. Kluwer Academic Publisher, 1987.
  • Anithakumari, S. ; Chithraprasad, D. , "An Efficient Pattern Matching Algorithm for Intrusion Detection Systems," Advance Computing Conference, 2009. IACC 2009. IEEE International , vol. , no. , pp. 223,227, 6-7 March 2009
  • Bhavani sunke, Research and Analysis of Network Intrusion Detection systems, Internet, 1-88, 2008.
  • B. Raju1 and B. SrinivasNetwork Intrusion Detection System Using KMP Pattern Matching Algorithm, IJCST,33-36, January 2012.
  • Aditya Harbola et. al. "Green computing research challenges: A review", IJARCSSE, Volume 3, Issue 10, October 2013