Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Intrusion Detection System

R. Sivagami, D. Sathya

Abstract


An intrusion detection system is a device or an application which monitor network, system activities for malicious activities, policy violations and also produces reports to a management station. This paper surveys proposed work on Intrusion Detection System and describe about comprehensive classification of various IDS approaches according to their employed detection technique. The main categories explored in this paper are anomaly detection, rule based intrusion detection and PCA based modular neural network. Thus the paper’s main aim is to include the most recent advancement in the area intrusion detection system as well as predict the future course of research.


Keywords


Anomaly, Intrusion Detection, Neural Network

Full Text:

PDF

References


Xiao Shang and Laurie A. Chisholm “Classification of Australian Native Forest Species

Using Hyperspectral Remote Sensing and Machine-Learning Classification Algorithms”, IEEE Journal 2013.

Sandy Mahfouz, Farah Mourad-Chehade, Paul Honeine, Joumana Farah, and Hichem Snoussi “Target Tracking Using Machine Learning and Kalman Filter in Wireless Sensor Networks” IEEE SENSORS JOURNAL, VOL. 14, NO. 10, OCTOBER 2014.

Amit D. Sagale, Swati G. Kale “Combining Naive Bayesian and Support Vector Machine for Intrusion Detection System” IJCAT International Journal of Computing and Technology, Volume 1, Issue 3, April 2014.

James E. King, Student Member, IEEE, Samuel C. E. Jupe, and Philip C. Taylor, Senior Member, IEEE “Network State-Based Algorithm Selection for Power Flow Management Using Machine Learning” IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 30, NO. 5, SEPTEMBER 2015.

Maithili Arjunwadkar 1, R.V. Kulkarni 2,“The Rule Based Intrusion Detection and Prevention Model for Biometric System”, Journal of Emerging Trends in Computing and Information Sciences[117] April 2014.

Rodrigo Roman, Jianying Zhou, Javier Lopez, “Applying Intrusion Detection Systems to Wireless Sensor Networks”, IEEE Transactions On Parallel and Distributed Systems, vol. 22, no. 9, september 2011.

Khaled Al-Nafjan , Musaed A. Al-Hussein , Abdullah S. Alghamdi, Mohammad Amanul Haque, and Iftikhar Ahmad, “Intrusion Detection Using PCA Based Modular Neural Network”, International Journal of Machine Learning and Computing, Vol. 2, No. 5, October 2012.

Matthias Becker, Martin Drozda, Sven Schaust Sebastian, Bohlmann Helena, Szczerbicka, “On Classification Approaches for Misbehavior Detection in Wireless Sensor Networks”, Journal of Computers, vol. 4, no. 5.

Andrew Gilbert, John Illingworth and Richard Bowden, “Accurate Fusion of Robot, Camera and Wireless Sensors for Surveillance Applications”, IEEE Transactions On Industrial Electronics, vol. 58, no. 3, march 2012.

Julien A. Vijverberg, Roel T.M. Janssen_ Remco de Zwart_ Peter H.N. de, “perimeter-intrusion event classification for on-line detection using multiple instance learning solving temporal ambiguities” 978-1-4799-5751-4/14/$31.00 IEEE 2014.

Murad A. Rassam, M.A. Maarof and Anazida Zainal “A Survey of Intrusion Detection Schemes in Wireless Sensor Networks” American Journal of Applied Sciences 9 (10): 1636-1652, 2012.

Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman and Wai-Choong Wong “On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks” IEEE COMMUNICATIONS SURVEYS & TUTORIALS 2013.

Zhenwei Yu, Jeffrey J. P. Tsai, Fellow, IEEE, and Thomas Weigert “An Automatically Tuning Intrusion Detection System” IEEE TRANSACTIONSON SYSTEMS, man, and cybernetics—part b: cybernetics, vol. 37, no. 2, April 2007.

Khalil El-Khatib “Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems” IEEE TRANSACTIONS on parallel and distributed systems, VOL. 21, NO. 8, AUGUST 2010.

Chunjie Zhou, Shuang Huang, Naixue Xiong, Senior Member, IEEE, Shuang-Hua Yang, Senior Member, IEEE, Huiyun Li, Yuanqing Qin, and Xuan Li “Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation” IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS, VOL. 45, NO. 10, OCTOBER 2015.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.