Study of hybrid intrusion detection system

Intrusion Detection System (IDS) has been introduced as a forefront security to detect various attacks. IDS aims to detect intrusions before seriously damage data transmitted in communication network to improve ID the proposed system introduces combined modules to attain better results for the well known ID metrics in addition of the trade-off metrics to characterize each combination. Finally, experiments are carried out to compare among the introduced methods and conclusions are derived.

[1]  Gulshan Kumar,et al.  Evaluation Metrics for Intrusion Detection Systems - A Study , 2014 .

[2]  Ingoo Han,et al.  The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..

[3]  S. Devaraju,et al.  PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES – A REVIEW , 2013 .

[4]  Sushil Jajodia,et al.  Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.

[5]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[6]  S. Devaraju,et al.  Performance analysis of intrusion detection system using various neural network classifiers , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[7]  Ulf Lindqvist,et al.  Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[8]  Andrew Meneely,et al.  Are Intrusion Detection Studies Evaluated Consistently? A Systematic Literature Review , 2016 .

[9]  Timo Horeis Intrusion Detection with Neural Networks – Combination of Self-Organizing Maps and Radial Basis Function Networks for Human Expert Integration , .

[10]  James M. Keller,et al.  A possibilistic fuzzy c-means clustering algorithm , 2005, IEEE Transactions on Fuzzy Systems.

[11]  M. Shyu,et al.  A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .

[12]  Jim Alves-Foss,et al.  NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach , 2001, NSPW '01.

[13]  Kai Hwang,et al.  Frequent Episode Rules for Intrusive Anomaly Detection with Internet Datamining , 2004 .