Open Access   Article Go Back

A Perspective Study on Network Intrusion Detection System Using Various Approaches

K. Soundarraj1 , M. Ravichandran2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 822-825, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.822825

Online published on Jan 31, 2019

Copyright © K. Soundarraj, M. Ravichandran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Soundarraj, M. Ravichandran, “A Perspective Study on Network Intrusion Detection System Using Various Approaches,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.822-825, 2019.

MLA Style Citation: K. Soundarraj, M. Ravichandran "A Perspective Study on Network Intrusion Detection System Using Various Approaches." International Journal of Computer Sciences and Engineering 7.1 (2019): 822-825.

APA Style Citation: K. Soundarraj, M. Ravichandran, (2019). A Perspective Study on Network Intrusion Detection System Using Various Approaches. International Journal of Computer Sciences and Engineering, 7(1), 822-825.

BibTex Style Citation:
@article{Soundarraj_2019,
author = {K. Soundarraj, M. Ravichandran},
title = {A Perspective Study on Network Intrusion Detection System Using Various Approaches},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {822-825},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3591},
doi = {https://doi.org/10.26438/ijcse/v7i1.822825}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.822825}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3591
TI - A Perspective Study on Network Intrusion Detection System Using Various Approaches
T2 - International Journal of Computer Sciences and Engineering
AU - K. Soundarraj, M. Ravichandran
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 822-825
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
440 418 downloads 175 downloads
  
  
           

Abstract

With the increasing demand on automation and computers, one of the chief issues in the present decade has been to build a secure network, to prevent against malicious activities on the network. The process which monitors and analyzes the communication of network and detects intrusion and anomalies is termed as Intrusion Detection System (IDS). By handling such huge voluminous network traffic-based IDS also creates new issues. To overcome this, many statistics, machine learning and artificial intelligence-based approaches were started evolving. This paper focuses on the importance of such techniques in the field of intrusion detection by performing detailed survey. It presents a general overview of IDS, types of IDs and various methods used for classification. It also describes the several methods and the importance of IDSs in information security

Key-Words / Index Term

Intrusion Detection System, Machine Learning, Artificial Intelligence, Statistics, Data mining and Neural Networks

References

[1] Kumar, S, Yadav A, Increasing Performance Of Intrusion Detection System Using Neural Network, Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on, p546-550, May 2014.
[2] Aljurayban, N.S.; Emam, A. Framework for Cloud Intrusion Detection System Service, Web Applications and Networking (WSWAN), 2nd World Symposium, pp 1-5, 2015
[3] Jiefei Ma; Le, F.; Lobo, J.; Russo, A, Detecting Distributed Signature-based Intrusion: The Case of Multi-Path Routing Attacks. Computer Communications (INFOCOMIEEE Conference on, p558-566, 2015
[4] Anazida Zainal, Mohd Aizaini Maarof and Siti Mariyam Shamsuddin “Data Reduction and Ensemble Classifiers in Intrusion Detection” in 2008 IEEE.
[5] Guangqun Zhai, Chunyan Liu “Research and Improvement on ID3 Algorithm in Intrusion Detection System” in 2010 IEEE.
[6] Jorge Blasco, Agustin Orfila, Arturo Ribagorda “Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming” DOI 10.1109/ARES.2010.53 in IEEE 2010.
[7] Ahmed Youssef and Ahmed Emam “Network Intrusion Detection using Data Mining and NetworkBehavior Analysis” International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011.
[8] Mohd. Junedul Haque, Khalid.W. Magld, Nisar Hundewale “An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques” in 2012 IEEE.
[9] S. Devaraju, S .Ramakrishnan “Detection of Accuracy for Intrusion Detection System using Neural Network Classifier” International Journal of Emerging Technology and Advanced Engineering( ISSN 2250-2459 (Online), An ISO 9001:2008 Certified Journal, Volume 3, Special Issue 1, January 2013).
[10] S.A.Joshi, Varsha S.Pimprale “Network Intrusion Detection System (NIDS) based on Data Mining” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 1, January 2013.
[11] G. Mageswary1 , Dr. M. Karthikeyan2 Intrusion Detection Using Data Mining Techniques International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org || PP. 20-25
[12] Helman, Paul, Liepins, Gunar, and Richards, Wynette, "Foundations of Intrusion Detection," The IEEE Computer Security Foundations Workshop V, 1992
[13] J. Shun and H. A. Malki, "Network Intrusion Detection System Using Neural Networks," 2008 Fourth International Conference on Natural Computation, Jinan, 2008, pp. 242-246.
[14] Butun, Ismail; Morgera, Salvatore D.; Sankar, Ravi (2014). "A Survey of Intrusion Detection Systems in Wireless Sensor Networks". IEEE Communications Surveys & Tutorials
[15] Mostaque Md. Morshedur Hassan,” Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic”, IJIRC2013.
[16] Prabhdeep Kaur, Sheveta Vashisht ”Mingle Intrusion Detection System Using Fuzzy Logic”, IJEAT 2013.