An Analytical Survey on Intrusion Detection System and Their Identification Methodologies

A computer network is bound to have several issues with the increase in the advancement in the technological world today. It is vulnerable against several attacks and threats from hackers which could probably devour the whole network set up. This prompted the need for the researchers to build an application system that would possibly secure and safeguard the network environment. An Intrusion Detection System (IDS) is one such entity that is developed with the competence to reveal the attacks in network systems. In this paper a detailed approach to vulnerabilities in a network system and the importance of IDS and a analytical study of the IDS techniques and principles is discussed.

[1]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[2]  Jiqiang Tang,et al.  A survey of network traffic generation , 2015 .

[3]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[4]  Mohammad Hammoudeh,et al.  A Survey on Network Security Monitoring Systems , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[5]  S Vijayarani,et al.  INTRUSION DETECTION SYSTEM - A STUDY , 2015 .

[6]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[7]  Ali Movaghar-Rahimabadi,et al.  Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.

[8]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.