Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Intrusion Detection System Based on Artificial Intelligence


Affiliations
1 School of Information Technology and Engineering, VIT University, Vellore, India
2 VIT University, Vellore, India
     

   Subscribe/Renew Journal


The Internet plays a major role in today’s environment but many attacks are happening over the networks and it may cause serious issues. Intrusion detection system provides a way to prevent the network anomalies and threats. It plays a vital role in network security. The violation activity happenings over the networks can be prevented by intrusion detection system, it collects the detected activity using security information and event management (SIEM). Some IDS have the ability to respond to the detected intrusions. Systems with response capabilities are typically referred to as an intrusion prevention system. There are many techniques which are used to design IDSs for specific scenario and applications. Artificial intelligence techniques are mostly used for threats detection.

Keywords

Intrusion Detection, Neural Networks, Knowledge Base.
Subscription Login to verify subscription
User
Notifications
Font Size


  • Alrajeh, Nabil Ali, and Jaime Lloret. "Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. "International Journal of Distributed Sensor Networks (2013).
  • P. Srinivasu, P.S. Avadhani, V. Korimilli, P. Ravipati, Approaches and Data Processing Techniques for Intrusion Detection Systems", Vol. 9, No. 12, 2009.
  • Alrajeh N., Khan S., Shams B.Intrusion detection systems in wireless sensor networks: a review International Journal of Distributed Sensor Networks 2013
  • Alrajeh N., Khan S., Lloret J., Loo J.Artificial neural network based detection of energy exhaustion attacks in wireless sensor networks capable of energy harvesting Journal of Ad Hoc and Sensor Wireless Networks2013
  • Li Y. Y., Parker L. E.Intruder detection using a wireless sensor network with an intelligent mobile robot response Proceedings of the IEEE Southeast Conference April 2008
  • Mukherjee P., Sen S.Using learned data patterns to detect malicious nodes in sensor networks Distributed Computing and Networking2008.Berlin, Germany Springer.
  • Marcos M. Campos, Boriana L. Milenova, Creation and Deployment of Data Mining-Based Intrusion Detection Systems in Oracle Database 10g", in Proceedings of the Fourth International Conference on Machine Learning and Applications, 2005.
  • Goyal A., Kumar C.GA-NIDS: a genetic algorithm based network intrusion detection system2008
  • D. Md. Farid, M. Z. Rahman, Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm", in Journal of Computers, Vol. 5, no. 1, January 2010.
  • Khanna R., Liu H., Chen H.-H.Reduced complexity intrusion detection in sensor networks using genetic algorithm Proceedings of the IEEE International Conference on Communications (ICC '09)June 2009

Abstract Views: 47

PDF Views: 6




  • Intrusion Detection System Based on Artificial Intelligence

Abstract Views: 47  |  PDF Views: 6

Authors

A. Anitha
School of Information Technology and Engineering, VIT University, Vellore, India
S. V. Revathi
VIT University, Vellore, India
S. Jeevanantham
VIT University, Vellore, India
E. Eliza Godwin
VIT University, Vellore, India

Abstract


The Internet plays a major role in today’s environment but many attacks are happening over the networks and it may cause serious issues. Intrusion detection system provides a way to prevent the network anomalies and threats. It plays a vital role in network security. The violation activity happenings over the networks can be prevented by intrusion detection system, it collects the detected activity using security information and event management (SIEM). Some IDS have the ability to respond to the detected intrusions. Systems with response capabilities are typically referred to as an intrusion prevention system. There are many techniques which are used to design IDSs for specific scenario and applications. Artificial intelligence techniques are mostly used for threats detection.

Keywords


Intrusion Detection, Neural Networks, Knowledge Base.

References