Open Access Open Access  Restricted Access Subscription or Fee Access

A Comprehensive Review on Intrusion Detection Systems

M. Sreenath


Internet and computer networks are presented to a regularly expanding number of security dangers that can harm computer networks and correspondence channels. Firewalls are utilized to guard networks yet at the same time they are insufficient to give full security to the networks. At that point, the worry with Intrusion Identification Systems has been developing for network security over the previous years. Because of the expanding of networks’ speed and the amount of network traffic, it is vital that Detection Systems need to be lightweight to adapt to it. This paper focuses on the review of intrusion detection systems.


Abuse Detection, Anomaly Detection, Intrusion Detection System, Information Security

Full Text:



William, Stallings, and William Stallings. Cryptography and Network Security, 4/E. Pearson Education India, 2006.

Northcutt, Stephen, and Judy Novak. Network intrusion detection. Sams Publishing, 2002.

Bace, Rebecca, and Peter Mell. NIST special publication on intrusion detection systems. BOOZ-ALLEN AND HAMILTON INC MCLEAN VA, 2001.

Puketza, Nicholas, Mandy Chung, Ronald A. Olsson, and Biswanath Mukherjee. "A software platform for testing intrusion detection systems." Software, IEEE 14, no. 5, 1997.

Debar, Hervé, Marc Dacier, and Andreas Wespi. "Towards taxonomy of intrusion-detection systems." Computer Networks 31, no. 8, 1999.

Asmaa Shaker Ashoor and Prof. Sharad Gore,” Importance of Intrusion Detection System (IDS),”International journal of scientific and Engineering Research, ISSN 2229-5518, Volume 2, Issue 1,January-2011.

Kazienko, Przemyslaw, and Piotr Dorosz. "Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)." Retrieved April 20,2003 .

J Anderson, An Introduction to Neural Networks MIT, Cambridge, 1995.

B Rhodes, J Mahaffey, J Cannady, “Multiple self-organizing maps for intrusion detection”, Paper presented at the Proceedings of the 23rd National Information Systems Security Conference, Baltimore, 16–19, 2000.

Byun, Hyeran, and Seong-Whan Lee. "Applications of support vector machines for pattern recognition: A survey." In Pattern recognition with support vector machines, pp. 213-236. Springer Berlin Heidelberg, 2002.

R. Jagannathan, Teresa Lunt, Debra Anderson, Chris Dodd, Fred Gilham, Caveh Jalali, Hal Javitz,Peter Neumann, Ann Tamaru, and Alfonso Valdes. System design document..”Next-generation intrusion detection expert system (NIDES)”. Technical Report A007/A008/A009/A011/A012/A014, SRI International, 333 Ravenswood Avenue, Menlo Park, CA 94025, March 1993.

Sandeep Kumar and Eugene Spa_ord. “A pattern matching model for misuse intrusion detection”. In Proceedings of the 17th National Computer Security Conference, pages 11{21, October 1994.

Huang, Guang-Bin, Dian Hui Wang, and Yuan Lan. "Extreme learning machines: a survey." International Journal of Machine Learning and Cybernetics 2, no. 2 ,2011.

Paul Spirakis, Sokratis Katsikas, Dimitris Gritzalis, Francois Allegre, John Darzentas, Claude Gigante, Dimitris Karagiannis, P. Kess, Heiki Putkonen, and Thomas Spyrou. “SECURENET: A network-oriented intelligent intrusion prevention and detection syste”. Network Security Journal, 1(1), November 1994.

P. Porras and A. Valdes, “Live Traffic Analysis of TCP/IP Gateways,” Proceedings of the 1998 ISOC Symposium on Network and Distributed System Security (NDSS’98), San Diego, CA, March 1998.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.