Methods and Techniques of Intrusion Detection: A Review

被引:3
|
作者
Somya [1 ]
Bansal, Palak [1 ]
Ahmad, Tameem [1 ]
机构
[1] Aligarh Muslim Univ, ZH Coll Engn & Technol, Dept Comp Engn, Aligarh, Uttar Pradesh, India
来源
SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016 | 2016年 / 628卷
关键词
Intrusion detection; Techniques and methods; Malware; Signature based IDS; Anomaly based IDS;
D O I
10.1007/978-981-10-3433-6_62
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malware is an abbreviated term meaning "malicious software". This software has a capability to gain access or infect a system without the knowledge of the owner. In this paper, we have tried to provide brief information about different types of malwares known till date such as virus, rabbits, botnet, adware etc. Apart from those we have mentioned the cure to it i.e. intrusion detection. We have described various techniques of intrusion detection such as signature based, anomaly based, behavior based etc. Methods for implementing these techniques include neural networks, data mining etc. A brief description of Intrusion detection system is also provided which is a software application used to monitor the network and system activities and also to detect malicious actions. The objective of this paper is to provide complete study about the types of malware, techniques and methods of intrusion detection, challenges and applications.
引用
收藏
页码:518 / 529
页数:12
相关论文
共 50 条
  • [1] A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS
    Chakravarthi, S. Sreenivasa
    Veluru, Suresh
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 730 - 737
  • [2] A Review on Intrusion Detection Systems and Techniques
    Bhati, Nitesh Singh
    Khari, Manju
    Garcia-Diaz, Vicente
    Verdu, Elena
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2020, 28 (Supp02) : 65 - 91
  • [3] Review of Intrusion Detection Systems Taxonomy, Techniques, Methods and Future Research Directions
    Mikulas, Matus
    Kotuliak, Ivan
    2024 NEW TRENDS IN SIGNAL PROCESSING, NTSP 2024, 2024, : 105 - 112
  • [4] A Systematic Review of the Intrusion Detection Techniques in VANETS
    Naqvi, Ila
    Chaudhary, Alka
    Kumar, Anil
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2022, 11 (02): : 900 - 907
  • [5] Integrating data mining techniques with intrusion detection methods
    Mukkamala, R
    Gagnon, J
    Jajodia, S
    RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 33 - 46
  • [6] Intrusion detection techniques in network environment: a systematic review
    Maruthi Rohit Ayyagari
    Nishtha Kesswani
    Munish Kumar
    Krishan Kumar
    Wireless Networks, 2021, 27 : 1269 - 1285
  • [7] Network Intrusion Detection Using Hardware Techniques: A Review
    Abdulhammed, Razan
    Faezipour, Miad
    Elleithy, Khaled M.
    2016 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2016,
  • [8] Intrusion detection techniques in network environment: a systematic review
    Ayyagari, Maruthi Rohit
    Kesswani, Nishtha
    Kumar, Munish
    Kumar, Krishan
    WIRELESS NETWORKS, 2021, 27 (02) : 1269 - 1285
  • [9] Network Intrusion Detection, Literature Review and Some Techniques Comparision
    Nassar, Mostafa
    El-Bahnasawy, Nirmeen A.
    Ahmed, HossamEl-din H.
    Saleeb, Adel A.
    Abd El-Samie, Fathi E.
    2019 15TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO 2019), 2019, : 62 - 71
  • [10] A REVIEW AND COMPARISON OF VISUALIZATION TECHNIQUES FOR NETWORK INTRUSION DETECTION SYSTEM
    Zaki, Fakhrul Adli Mohd
    Saman, Md Yazid Mohd
    Megat, Megat Fakruddin
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 407 - 414