A hybrid intrusion detection system: A review

The most important purpose of intrusion detection system is to identify attacks against information systems. It is a security method attempting to identify various attacks. In this paper, we reviewed snort as misuse based intrusion detection system as well as ALAD, PHAD, LERAD, NETAD as anomaly based statistical algorithms.

[1]  Vinod Kumar,et al.  Signature Based Intrusion Detection System Using SNORT , 2012 .

[2]  Kapil Keshao Wankhade,et al.  An efficient approach for Intrusion Detection using data mining methods , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[3]  I. Sumaiya Thaseen,et al.  Intrusion detection model using fusion of PCA and optimized SVM , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[4]  Kai Li,et al.  Research on the intrusion detection technology with hybrid model , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.

[5]  M. Hemalatha,et al.  Handling Intrusion Detection System using Snort Based Statistical Algorithm and Semi-supervised Approach , 2013 .

[6]  Philip K. Chan,et al.  PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .

[7]  A. Halim Zaim,et al.  A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..

[8]  Philip K. Chan,et al.  Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.

[9]  M. Hemalatha,et al.  Effective approach toward Intrusion Detection System using data mining techniques , 2014 .

[10]  Matthew V. Mahoney,et al.  Network traffic anomaly detection based on packet bytes , 2003, SAC '03.

[11]  Saiyan Saiyod,et al.  Improving Intrusion Detection System based on Snort rules for network probe attack detection , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).

[12]  Lilly Suriani Affendey,et al.  Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).

[13]  Philip K. Chan,et al.  Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.

[14]  Divya Surender Lakra HSNORT: A Hybrid Intrusion Detection System using , 2013 .