Intrusion Detection System Methodologies Based on Data Analysis

With the rapidly growing and wide spread use of computer networks the number of new threats has grown extensively. Intrusion and detection system can only identifying and protecting the attacks successfully. In this paper we focuses on detailed study of different types of attacks using in KDD99CUP Data Set and classification of IDS are also presented. They are Anomaly Detection System, Misuse Detection Systems. Different Data Analysis Methodologies also explained for IDS. To identify eleven data computing techniques associated with IDS are divided groups into categories. Some of those methods are based on computation such as Fuzzy logic and Bayesian networks, some are Artificial Intelligence such as Expert Systems, agents and neural networks some other are biological concepts such as Genetics and Immune systems.

[1]  Belur V. Dasarathy Data mining, intrusion detection, information assurance, and data networks security 2006 : 17-18 April 2006, Kissimmee, Florida, USA , 2006 .

[2]  Theodoros Lappas,et al.  Data Mining Techniques for ( Network ) Intrusion Detection Systems , 2007 .

[3]  Peter Mell Understanding Intrusion Detection Systems , 2001 .

[4]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[5]  Salvatore J. Stolfo,et al.  Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.

[6]  Jaideep Srivastava,et al.  Intrusion Detection: A Survey , 2005 .

[7]  T. Bass,et al.  Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness , 1999 .

[8]  Salvatore J. Stolfo,et al.  Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.

[9]  R. Sekar,et al.  Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.

[10]  Jonatan Gómez,et al.  Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .

[11]  Kotagiri Ramamohanarao,et al.  Information sharing for distributed intrusion detection systems , 2007, J. Netw. Comput. Appl..

[12]  Anastasia Pagnoni,et al.  An innate immune system for the protection of computer networks , 2005 .

[13]  Susan C. Lee,et al.  Training a neural-network based intrusion detector to recognize novel attacks , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[14]  Ali Movaghar-Rahimabadi,et al.  Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.

[15]  N. Srinivasan,et al.  Timed Coloured Petri Net Model for Misuse Intrusion Detection , 2006, First International Conference on Industrial and Information Systems.

[16]  A. Anou,et al.  RETRACTED: A Bayesian Networks in Intrusion Detection Systems , 2007 .

[17]  M. Gordeev Intrusion Detection: Techniques and Approaches , 2003 .

[18]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[19]  Jingtao Yao,et al.  A study on fuzzy intrusion detection , 2005, SPIE Defense + Commercial Sensing.

[20]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.