A Survey on Intrusion Detection Systems and Classification Techniques

Today it is very important to provide a high-level security to protect highly sensitive and private information. Intrusion Detection System is an essential technology in Network Security. Nowadays researchers have interested on intrusion detection system using Data mining techniques as an artful skill. IDS is a software or hardware device that deals with attacks by collecting information from a variety of system and network sources, then analyzing symptoms of security problems. This paper includes an overview of intrusion detection systems and introduces the reader to some fundamental concepts of IDS methodology. We also discuss the primary intrusion detection techniques. In this paper, we emphasizes data mining algorithms to implement IDS such as Support Vector Machine, Kernelized support vector machine, Extreme Learning Machine and Kernelized Extreme Learning Machine.

[1]  Kyaw Thet Khaing,et al.  Enhanced Features Ranking and Selection using Recursive Feature Elimination ( RFE ) and k-Nearest Neighbor Algorithms in Support Vector Machine for Intrusion Detection System , 2010 .

[2]  Reema Patel,et al.  A Survey and Comparative Analysis of Data Mining Techniques for Network Intrusion Detection Systems , 2012 .

[3]  Hyeran Byun,et al.  Applications of Support Vector Machines for Pattern Recognition: A Survey , 2002, SVM.

[4]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[5]  V. Ch. Venkaiah,et al.  Intrusion Detection Systems - Analysis and Containment of False Positives Alerts , 2010 .

[6]  Navdeep Singh,et al.  A Survey of Intrusion Detection Techniques , 2013 .

[7]  Bu-Sung Lee,et al.  Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.

[8]  Manish Joshi Classification , Clustering And Intrusion Detection System , 2012 .

[9]  Salvatore J. Stolfo,et al.  Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.

[10]  Daniel S. Yeung,et al.  Weighted Mahalanobis Distance Kernels for Support Vector Machines , 2007, IEEE Transactions on Neural Networks.

[11]  Dianhui Wang,et al.  Extreme learning machines: a survey , 2011, Int. J. Mach. Learn. Cybern..

[12]  Glenn Fung,et al.  Multicategory Proximal Support Vector Machine Classifiers , 2005, Machine Learning.