General Study of Intrusion Detection System and Survey of Agent Based Intrusion Detection System

被引:0
作者
Saxena, Aumreesh Ku. [1 ]
Sinha, Sitesh [1 ]
Shukla, Piyush [2 ]
机构
[1] AISECT, CSE Dept, Bhopal, India
[2] UIT RGPV, CSE Dept, Bhopal, India
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA) | 2017年
关键词
Intrusion; Anomaly; Network; IDS; Host; Misuse; Agent; Mobile Agent;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.
引用
收藏
页码:417 / 421
页数:5
相关论文
共 17 条
  • [1] [Anonymous], 2015 1 INT C WIR TEL
  • [2] [Anonymous], 2016, 2016 3 INT C ADV COM, DOI DOI 10.1109/ICACCS.2016.7586351
  • [3] [Anonymous], 2015, 2015 2 WORLD S WEB A
  • [4] Bello FL, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, AND SYSTEMS (ICCCS), P93, DOI 10.1109/CCOMS.2015.7562879
  • [5] Brahmil I, 2011, SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, P198
  • [6] Can O, 2014, SIG PROCESS COMMUN, P1363, DOI 10.1109/SIU.2014.6830491
  • [7] El Ajjouri Mohssine, 2015, 2015 INT C WIRELESS, P1
  • [8] Ennahbaoui M, 2015, IEEE INT CONF INNOV, P314, DOI 10.1109/INNOVATIONS.2015.7381560
  • [9] Fallahi N, 2016, IRAN CONF ELECTR ENG, P1948, DOI 10.1109/IranianCEE.2016.7585840
  • [10] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28