A Survey on Intrusion Detection System Using Artificial Intelligence

With the increasing demand of the internet in the 21st century, we have the challenges to secure our network and data so, for we demand some software and devices to protect our system. However, these devices want high computational power and have a complex structure. We use firewall and IDS/IPS as an intermediary device and software for protecting our systems. An Intrusion Detection System used to monitor network traffic, and if any suspicious activity is occurring, it will automatically notify the security person to secure future access.

[1]  Hiren Kumar Deva Sarma,et al.  A probability based stable routing for cognitive radio adhoc networks , 2015, Wireless Networks.

[2]  Julian Jang,et al.  A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..

[3]  K. Navi,et al.  Optimum Quaternary Galois Field Circuit Design through Carbon Nano Tube Technology , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[4]  Gulshan Kumar,et al.  The use of artificial intelligence based techniques for intrusion detection: a review , 2010, Artificial Intelligence Review.

[5]  M. A. Jabbar,et al.  Random Forest Modeling for Network Intrusion Detection System , 2016 .

[6]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[7]  S. Smys,et al.  Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks , 2018, Wirel. Pers. Commun..

[8]  Jun Peng,et al.  Intrusion Detection System Enhanced by Hierarchical Bidirectional Fuzzy Rule Interpolation , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[9]  Iti Saha Misra,et al.  Multilayer Hierarchical Model for Mobility Management in IPv6: A Mathematical Exploration , 2014, Wirel. Pers. Commun..

[10]  Jasmin Kevric,et al.  An effective combining classifier approach using tree algorithms for network intrusion detection , 2017, Neural Computing and Applications.

[11]  Jong Hyuk Park,et al.  Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..

[12]  Shahram Babaie,et al.  A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection , 2018, Comput. Networks.

[13]  Ali A. Ghorbani,et al.  Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..

[14]  Seyed Mojtaba Hosseini Bamakan,et al.  An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.

[15]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[16]  Manuel López Martín,et al.  Adversarial environment reinforcement learning algorithm for intrusion detection , 2019, Comput. Networks.

[17]  Aladdin Ayesh,et al.  Intelligent intrusion detection systems using artificial neural networks , 2018, ICT Express.

[18]  Dinesh Kumar A,et al.  Fault Detection Methodology in Wireless Sensor Network , 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on.

[19]  A. Praveena,et al.  Prevention of inference attacks for private information in social networking sites , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[20]  L. Coventry,et al.  Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. , 2018, Maturitas.

[21]  S. Smys,et al.  Intelligent security framework for iot devices cryptography based end-to-end security architecture , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[22]  Andreas Hotho,et al.  A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..

[23]  Michail Maniatakos,et al.  Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.

[24]  I. S. Misra,et al.  Mathematical Modeling of Hierarchical Mobile IPv6 Based Network Architecture in Search of Optimal Performance , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[25]  Robert Bestak,et al.  Special issue on evolutionary computing and intelligent sustainable systems , 2019, Soft Comput..

[26]  Hiren Kumar Deva Sarma,et al.  Cluster based routing in cognitive radio adhoc networks: Reconnoitering SINR and ETT impact on clustering , 2018, Comput. Commun..