A brief introduction to intrusion detection system

Intrusion Detection System (IDS) is a security system that acts as a protection layer to the infrastructure. Throughout the years, the IDS technology has grown enormously to keep up with the advancement of computer crime. Since the beginning of the technology in mid 80’s, researches have been conducted to enhance the capability of detecting attacks without jeopardizing the network performance. In this paper we hope to provide a critical review of the IDS technology, issues that transpire during its implementation and the limitation in the IDS research endeavors. Lastly we will proposed future work while exploring maturity of the topic, the extent of discussion, the value and contribution of each research to the domain discussed. At the end of this paper, readers would be able to clearly distinguish the gap between each sub-area of research and they would appreciate the importance of these research areas to the industry.

[1]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[2]  Ray Hunt,et al.  Intrusion detection techniques and approaches , 2002, Comput. Commun..

[3]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[4]  Christopher Krügel,et al.  Using Decision Trees to Improve Signature-Based Intrusion Detection , 2003, RAID.

[5]  Lucas M. Venter,et al.  A comparison of Intrusion Detection systems , 2001, Comput. Secur..

[6]  Joshua Ojo Nehinbe,et al.  Automated Method for Reducing False Positives , 2010, 2010 International Conference on Intelligent Systems, Modelling and Simulation.

[7]  Safaa O. Al-Mamory,et al.  A survey on IDS alerts processing techniques , 2007 .

[8]  S. V. Raghavan,et al.  Intrusion detection through learning behavior model , 2001, Comput. Commun..

[9]  William J. Buchanan,et al.  An agent-based Bayesian forecasting model for enhanced network security , 2001, Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001.

[10]  Giovanni Vigna,et al.  Intrusion detection: a brief history and overview , 2002 .

[11]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[12]  Elsayed Radwan,et al.  Intrusion Detection Using Rough Set Parallel Genetic Programming Based Hybrid Model , 2009 .

[13]  A. B. Mohamed,et al.  Alert Correlation Using a Novel Clustering Approach , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[14]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[15]  Gongzhu Hu,et al.  Design and Performance Evaluation of a Machine Learning-Based Method for Intrusion Detection , 2010 .

[16]  Wencai Du,et al.  Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2010 , 2014 .

[17]  David Taniar,et al.  Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I , 2006, ICCSA.

[18]  Dewan Md. Farid,et al.  Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..

[19]  Norbik Bashah Idris,et al.  Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks , 2009, 2009 International Conference of Soft Computing and Pattern Recognition.

[20]  Ali A. Ghorbani,et al.  Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..

[21]  A. Kannan,et al.  A Neuro-genetic ensemble Short Term Forecasting Framework for Anomaly Intrusion Prediction , 2006, 2006 International Conference on Advanced Computing and Communications.

[22]  Dongho Won,et al.  Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model , 2006, ICCSA.