To search, Click below search items.


All Published Papers Search Service


Approaches and Data Processing Techniques for Intrusion Detection Systems


Pakkurthi Srinivasu, P.S. Avadhani, Vishal Korimilli, Prudhvi Ravipati


Vol. 9  No. 12  pp. 181-186


The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection systems (IDS).In this paper an overview of types of attacks, IDS components, and classifications of IDS is briefly given. Two approaches from the classification of IDS are also presented. They are anomaly-based detection and misuse-based detection. Anomaly-based detection approach is extremely powerful and novel tool which identifies anomalies as deviations from “normal” behavior and automatically detects any deviation from it. Misuse-based detection approach explicitly defines the attack behavior and classifies all events matching these specifications as attack. Data processing techniques for intrusion detection systems are also presented.


Intrusion Detection System, Type of attacks, Anomaly based intrusion detection, Misuse based intrusion detection, Network Security, Data Processing Techniques