Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Visumathi, J.
- An Efficient Intrusion Detection System Using Computational Intelligence
Abstract Views :410 |
PDF Views:4
Authors
Source
National Journal of System and Information Technology, Vol 3, No 2 (2010), Pagination: 117-126Abstract
Intrusion detection system is one of the widely used tools for defense in Computer Networks. In literature, plenty of research is published on Intrusion Detection Systems. In this paper we present a survey of Intrusion Detection Systems. We survey the existing types, techniques and approaches of Intrusion Detection Systems in the literature. Finally we propose a new architecture for Intrusion Detection System and outline the present research challenges and issues in Intrusion Detection SystemKeywords
Intrusion Detection, Neural Network, Fuzzy logic, Artificial Intelligence, Honeypot, Data MiningReferences
- Suhail Owais, Václav Snášel, Pavel Krömer, Ajith Abraham “Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques” CISIM 2008, IEEE, ISBN: 978-0-7695-3184-7
- Rakesh Agrawal, Ramakrishnan S&ant “Fast Algorithms for Mining Association Rules”, Proceddings of the 20th VLDB Conference Santiago, Chile, 1994
- Hu Zhengbing1, Li Zhitang1,Wu Junqi, ” A Novel Network Intrusion Detection System(NIDS) Based on Signatures Search of Data Mining” 2008 IEEE, Workshop on Knowledge Discovery and Data Mining
- Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, and Chun-Yuen Lin, “A Real-time Network Intrusion Detection System Based on Incremental Mining Approach”, 2008 IEEE
- Babak Khosravifar, Jamal Bentahar, “An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot”, 2008 IEEE, 22nd International Conference on Advanced Information Networking and Applications
- Marimuthu, Dr. A. Shanmugan, “Intelligent Progression for Anomoly Intrusion Detection”, 2008 IEEE, ISBN: 978-1-4244-2106-0
- ZHAN Jiuhua, “Intrusion Detection System Based on Data Mining”, 2008 IEEE, Workshop on Knowledge Discovery and Data Mining
- Youssif Al-Nashif, Aarthi Arun Kumar, Salim Hariri, Guangzhi Qu, Yi Luo, Ferenc Szidarovsky, “Multi-Level Intrusion Detection System”, 2008 IEEE, International Conference on Automonic Computing
- Bane Raman Raghunath, Shivsharan Nitin Mahadeo, “Network Intrusion Detection System”, 2008 IEEE, First International Conference on Emerging Trends in Engineering and Technology
- Joong-Hee Leet, Jong-Hyouk Leet, Seon-Gyoung Sohn, Jong-Ho Ryu, and Tai- Myoung Chungt, “Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System”, 2008 IEEE, ISBN: 978-89-5519- 136-3
- Lgor Vinicius Mussoi de Lima, Joelson Alencar Degaspari, Jo˜ao Bosco Mangueira Sobral, “Intrusio n Detection Through Artificial Neural Networks”, 2008 IEEE, ISBN: 978-1-4244-2066-7
- Do-hyeon Lee, Doo-young Kim, Jae-il Jung, “Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm”, 2008 IEEE, International Conference on Information Science and Security .
- Lu Huijuan, Chen Jianguo,d Wei Wei, “Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System”, 2008 IEEE, Internation al Symposium on Electronic Commerce and Security
- Divyata Dal, Siby Abraham, Ajith Abraham, Sugata Sanyal, Mukund Sanglikar, “Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System”, 2008 IEEE, 7th Computer Information Systems and Industrial Management Applications
- Amin Hassanzadeh, Babak Sadeghian, “Intrusion Detection with Data Correlation Relation Graph”, 20 08 IEEE, The Third International Conference on Availability, Reliability and Security
- S.Sangeetha, V. Vaidehi, N.Srinivasan, K.V. Rajkumar, S. Pradeep, N.Ragavan, C.Sri Sai Lokesh, I.Subadeepak, V.Prashanth, “Implementation Of Application Layer Intrusion Detection System Using Protocol Analysis”, IEEE 2008, IEEE International Conference on Signal processing, Communications and Networking
- Mrs. P. Kola Sujatha Dr. A. Kannan S. Ragunath K. Sindhu Bargavi S. Githanjali,“A Behavior Based Approach to Host-Level Intrusion Detection using Self-organizing Maps”, 2008 IEEE, First International Conference on Emerging Trends in Engineering and Technology
- Robert, Richardson, “2007 Computer Crime and Security Survey”, http://i.cmpnet.com/v2.gocsi.com/pdf/CSISurvey2007.p df
- Ya-Li Ding, Lei Li, Hong-Qi Luo, “A novel signature searching for Intrusion Detection System using data mining”, 2009 IEEE Eighth International Conference on Machine Learning and Cybernetics ISBN: 978-1-4244-3703-0
- Juan Wang, Qiren Yang, Dasen Ren “An intrusion detection algorithm based on decision tree technology”, 2009 IEEE Asia-Pacific Conference on Information Processing ISBN: 978-0-7695-3699-6
- Rakesh Agrawal, Arun Swami, Tomasz Imielinski, “Mining Association Rules between Sets of Items in Large Databases” , Proceedings of the 1993 ACM SIGMOD Conference Washington DC, USA, May 1993
- Heikki Manila, Hannu Toivonen, A. Inkeri Verkamo “Efficient Algorithm s for Discovering Association Rules”, Knowledge Discovery in Databases (KDD’94) U.M. FAYYAD and R. Uthurusamy (EDS), AAAI Press, 1994, p. 181 – 192
- “Creation and Deployment of Data Mining-Based Intrusion Detection Systemsin Oracle Database 10g ” http://www.oracle.com/technology/products/bi/odm/pdf/odm_based_intrusion_dete ction_paper_1205. pdf
- Improved Detection of Dos Attacks Using Intelligent Computation Techniques
Abstract Views :243 |
PDF Views:4
Authors
Source
National Journal of System and Information Technology, Vol 3, No 2 (2010), Pagination: 127-138Abstract
IDSs play a principal role in pro-actively detecting intrusions into enterprise-level computer networks, therefore the accuracy with which it performs this vital function is of paramount importance. Many studies have previously been conducted to improve upon proper classification of detections using neural networks and machine learning algorithms. We try to compare the performance of various intelligent computation techniques like Bayesian networks, Naive Bayesian, Logistic regression, RBF networks, Multi-Layer perception, SVMs with the SMO model, Kth nearest neighbour and Random forest in detecting DoS attack patterns. The data that was used to train and validate these techniques was obtained from the MIT Lincoln lab study into IDSs. The results obtained provide a clear comparison of the individual intelligent computation techniques ability in identifying and classifying attack patterns.Keywords
Networks, Intrusion Detection, Denial of Service, Datasets, Data Mining, Bayesian Networks, Naive Bayesian, Logistic Regression, RBF Networks, Multi-layer Perception, Support Vector Machines, Sequential Minimal Optimization, Kth Nearest Neighbor, Random ForestReferences
- Kruegal C., Valeur F., Vigna G., Kemmerer R., “Statefull intrusion detection for high speed networks”, In proceedings of IEEE Symposium on Security and Privacy, pp 285-294, May 2002
- Mukkamala S., and Sung. A. H. (2003) A Comparative Study of Techniques for Intrusion Detection. Proceedings of 15th IEEE International Conference on Tools with Artificial Intelligence, IEEE Computer Society Press, pp 570-579
- K. Park, and H. Lee, “On the Effectiveness of Router-Based Packet Filtering for Distributed DoS attack and Prevention in Power-Law Internets”, Proc. of the SGICOMM, pp. 15-26, 2001
- S. E. Webster, “The Development and Analysis of Intrusion Detection Algorithms”, S.M. Thesis, Massachusetts Institute of Technology, 1998
- K. Kendall, “A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems”, Master's Thesis, Massachusetts Institute of Technology, 1998.
- “Internet Protocol Specification”, IETF, RFC 791, September 1981
- CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks http://www.cert.org/advisories/CA-1998-01.html, January 5, 1998
- Jason Anderson, “An Analysis of Fragmentation Attacks”, March 2001
- “Statistics: Methods and Applications”, Statsoft Publications
- Vladimir V. N. (1995) The Nature of Statistical Learning Theory. Springer
- Tommi Jaakkola, “Machine Learning: Bayesian networks, Support Vector Machines & Model selection”, MIT, 2006
- Jia Li, “Logistical Regression”, Department of Statistics, University of Pennsylvania, 2000~
- Ying So, “A Tutorial on Logisitc Regression”, SAS Institute, 2001
- [John Platt, “Fast training of support vector machines using sequential minimal optimization,” Advances in kernel methods: support vector learning, Pages: 185 – 208, 1999
- [Harp P.E., “Nearest neighbour pattern classification”. IEEE Transactions on Information Theory 13 (1): 21-27 (1967)
- Leo Breiman, “Random Forests”, Machine Learning, pp5-32, Kluwer Academic Publishing, 2001.