A Technical Review on Intrusion Detection System

Abstract

Network security is a big issue at present for large organizations. There are many types of Intrusion Detection Systems like Host Based IDS, Network Based IDS, Anomaly Based IDS and Misuse Based IDS etc. There are various methods to implement IDS that are based on some artificial intelligence concepts which improve performance of IDS. Some of those techniques are Neural Network, Data Mining, Genetic algorithm, Fuzzy Logic etc. The paper reviews these techniques and their comparison in brief.

Authors and Affiliations

Sejal K. Patel , Umang H. Mehta , Urmi M. Patel , Dhruv H. Bhagat , Pratik Nayak , Ankita D. Patel

Keywords

Related Articles

A Review of C-TREND Using Complete-Link Clustering for Transactional Data

Data mining has made broad and significant progress since its early beginnings. Today data mining is used in a vast array of areas, and numerous commercial data mining system that are available. There are many data minin...

DIVERSE ROUTING IN NETWORKS WITHOUT DISJOINTNESS CONSTRAINT USING PROBABILISTIC FAILURES

To develop a various routing theme for coping with multiple, presumably related to failures. Isolated single link failures is effectively restrained disjoint path protection, however mechanisms for sick from multiple fai...

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

In Mobile Ad-Hoc Networks (MANETs), mobile devices are operational with power. In order to utilize these energy operational devices resourcefully for transmission of data packets, many energy aware routing strategies are...

MULTI LAYER NEURAL NETWORK AND SOUNDEX ALGORITHMS FOR TEXT RECOGNITION MODEL

This paper presents a text recognition model based on two algorithms multi-layer neural networks and Soundex algorithms. The text recognition model receives, recognize the text SMS sent by the user. Based on recognition,...

TOWARDS DEVELOPMENT OF CLOUD OPERATING SYSTEMS

Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...

Download PDF file
  • EP ID EP105634
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

Sejal K. Patel, Umang H. Mehta, Urmi M. Patel, Dhruv H. Bhagat, Pratik Nayak, Ankita D. Patel (2015). A Technical Review on Intrusion Detection System. International Journal of Computer Science & Engineering Technology, 6(1), 17-22. https://europub.co.uk/articles/-A-105634