To search, Click below search items.

 

All Published Papers Search Service

Title

Approaches and Data Processing Techniques for Intrusion Detection Systems

Author

Pakkurthi Srinivasu, P.S. Avadhani, Vishal Korimilli, Prudhvi Ravipati

Citation

Vol. 9  No. 12  pp. 181-186

Abstract

The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection systems (IDS).In this paper an overview of types of attacks, IDS components, and classifications of IDS is briefly given. Two approaches from the classification of IDS are also presented. They are anomaly-based detection and misuse-based detection. Anomaly-based detection approach is extremely powerful and novel tool which identifies anomalies as deviations from “normal” behavior and automatically detects any deviation from it. Misuse-based detection approach explicitly defines the attack behavior and classifies all events matching these specifications as attack. Data processing techniques for intrusion detection systems are also presented.

Keywords

Intrusion Detection System, Type of attacks, Anomaly based intrusion detection, Misuse based intrusion detection, Network Security, Data Processing Techniques

URL

http://paper.ijcsns.org/07_book/200912/20091227.pdf