A Survey of Techniques for Intrusion Detection System

Abstract

In this paper we will discuss the various kinds of anomalous and malicious activities, which can be a symptoms of Intrusion. The term Intrusion detection was coined in 1980. Since then many Frameworks for Intrusion Detection were proposed and executed successfully. But, day by day attackers come-up with new ideas, and with them, the field of Intrusion detection should also update in the technologies and methods of detecting Intrusions in the network. So, in this paper we will discuss about various frameworks or methods which were proposed by researchers, and their use and effectiveness in the field of Intrusion Detection. To detect Intrusion in the network we required a distributed approach which is a kind of using small independent entities, called as Agents, to detect these anomalous or malicious behaviors. Along with this the different data mining methods and algorithms are also used in Intrusion Detection.

Authors and Affiliations

Mr. Rahul Chinchore, Prof. S. S. Sambare

Keywords

Related Articles

Faults Identification by Passing Test Packets Through Efficient Tool In Network

ATPG comprehends router designs and produces a device autonomous model. The reproduction is utilized to deliver a base arrangement of test packets to negligibly put into impact each connection in the network or maxim...

Analysis of Four Stage Encryption

Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alph...

A Review On Data Mining Process In Healthcare Department To Identify The Frequently Occurring Diseases

Data mining is a process of analyzing large volumes of data to extract the useful knowledge from it. Data mining techniques is applied on medical data to improve the service in healthcare department. Availability of...

Fake Currency Detection Using Image Processing and Other Standard Methods

Counterfeit money is imitation currency produced without the legal sanction of the state or government. Producing or using this fake money is a form of fraud or forgery. Counterfeiting is as old as money itself, and...

Nomadic Transmitting Alignment in File Exhaustive Wireless Networks

In this paper, we are attentive in reducing the delay and increasing the period of occurrence in wireless sensor networks for which events occur infrequently. The most of the energy is consumed in such systems when t...

Download PDF file
  • EP ID EP27707
  • DOI -
  • Views 261
  • Downloads 4

How To Cite

Mr. Rahul Chinchore, Prof. S. S. Sambare (2013). A Survey of Techniques for Intrusion Detection System. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27707