[go: up one dir, main page]

Nachan et al., 2021 - Google Patents

Intrusion Detection System: A Survey

Nachan et al., 2021

View PDF
Document ID
9696080491983033089
Author
Nachan H
Poddar D
Sarode S
Kumhar P
Publication year
Publication venue
International Journal of Engineering Research & Technology

External Links

Snippet

Intrusion Detection System is one of the most important tools in cybersecurity. It helps detect if an attack is occurring on our system and also helps prevent it. It can detect attacks on the system's network and also detect host attacks. IDS segregates signature and anomaly …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Benaddi et al. Improving the intrusion detection system for NSL-KDD dataset based on PCA-fuzzy clustering-KNN
Kaushik et al. Performance evaluation of learning models for intrusion detection system using feature selection
Sheelavant et al. Ensemble Learning-Based Intrusion Detection and Classification for Securing IoT Networks: An Optimized Strategy for Threat Detection and Prevention.
Rincy N et al. Design and development of an efficient network intrusion detection system using machine learning techniques
Lin et al. A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques
Nagaraja et al. UTTAMA: an intrusion detection system based on feature clustering and feature transformation
Edwin Singh et al. WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services.
Ketepalli et al. Data preparation and pre-processing of intrusion detection datasets using machine learning
Maidamwar et al. A survey on machine learning approaches for developing intrusion detection system
Samha et al. Intrusion detection system using hybrid convolutional neural network
Heinrich et al. Fool me Once, shame on You, Fool me Twice, shame on me: a Taxonomy of Attack and de-Fense Patterns for AI Security.
Walling et al. Performance Evaluation of Supervised Machine Learning Based Intrusion Detection with Univariate Feature Selection on NSL KDD Dataset
Nachan et al. Intrusion Detection System: A Survey
Prabhakaran et al. mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
Taylor et al. A smart system for detecting behavioural botnet attacks using random forest classifier with principal component analysis
Yang et al. Clustering and classification based anomaly detection
Beulah et al. Towards Improved Detection of Intrusions with Constraint-Based Clustering (CBC)
Abhale et al. Deep learning algorithmic approach for operational anomaly based intrusion detection system in wireless sensor networks
Ganeshan et al. I-AHSDT: intrusion detection using adaptive dynamic directive operative fractional lion clustering and hyperbolic secant-based decision tree classifier
Abinesh et al. Deep graph convolution neural network based intrusion detection system towards early detection of malicious attacks
Biju et al. Network intrusion detection system with an edge based hybrid feature selection approach
Chandan et al. Deep ensemble of classifier for intrusion detection in WSN and improved attack mitigation process
Farid et al. Attribute weighting with adaptive NBTree for reducing false positives in intrusion detection
Seh et al. A cybersecurity perspective of machine learning algorithms
ALshammari et al. A review analysis investigating the efficacy of machine learning in intrusion detection