Network Intrusion Detection and its strategic importance

In computer network security, a Network Intrusion Detection (NID) is an Intrusion Detection mechanism that attempts to discover unauthorized access to a computer network by analyzing traffic on the network for signs of malicious activity. There are many areas of research in this vast field of Network Intrusion Detection (NID) but in this survey paper, we will focus on its technology, development & strategic importance. Virus attacks, unauthorized access, theft of information and denial-of-service attacks were the greatest contributors to computer crime, a number of techniques have been developed in the past few years to help cyber security experts in strengthening the security of a single host or the whole computer network. Intrusion Detection is important for both Military as well as commercial sectors for the sack of their Information Security, which is the most important topic of research for the future networks.

[1]  Yuebin Bai,et al.  Intrusion Detection Systems: technology and development , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..

[2]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[3]  John McHugh,et al.  Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.

[4]  Song Naiping,et al.  A Study on Intrusion Detection Based on Data Mining , 2010, 2010 International Conference of Information Science and Management Engineering.

[5]  David Cornforth,et al.  An overview of recent advances in intrusion detection , 2008, 2008 8th IEEE International Conference on Computer and Information Technology.

[6]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[7]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[8]  Evgeniya Nikolova,et al.  Anomaly Based Intrusion Detection Using Data Mining and String Metrics , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[9]  Mallikarjun Shankar,et al.  Fusing intrusion data for detection and containment , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..