A SURVEY OF INTRUSION DETECTION SYSTEMS
Date
2015-04-01
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Department of computer science, nassarawa state university, keffi
Abstract
There is currently a need for an up-to-date, thorough survey of the field of intrusion detection. This paper presents such a sun’ey of the important research on intrusion detection systems to date. It should be noted that the main focus of this survey is intrusion detection systems, in other words major research efforts that have resulted in prototypes that can be studied both quantitatively and qualitatively. We touched a number of open questions related to intrusion detection. However, there are a number of unresolved issues regarding the scope of analysis that an IDS performs and the interoperability of intrusion detection systems
Description
Keywords
Intrusion Detection Systems, mobile agents, network security, data mining
Citation
Alouf, S., Huet, F. and Nain, P. (2002)"Forwarders vs. Centralized Server: An Evaluation of Two Approaches for Locating Mobile Agents". Rap.derech. No4440, INRIA. Alrajeh N. A. and Lloret J., (2013) “Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 351047, 6 pages, doi: 10.1155/2013/351047. Barbara D., Couto J., Jajodia S.,and Wu N., (2001) “Special section on datamining for intrusion detection and threat analysis: Adam: a test bed for exploring the use of data mining in intrusion detection,” ACSIGMOD Record, vol. 30, pp. 15-24. Bhattasali T., and Chaki R., (2011) “A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network”, in International Conference Security and Applications (CNSA-2011), Springer, pp. 268-280. Bridges S. M. and Rayford M. V.. (2000) “Fuzzy data mining andgenetic algorithms applied to intrusion detection,” in Proceedings of the Twenty third National Information Systems SecurityConference. National Institute of Standards and Technology. Debar H., Becke M., SibonD. I, (1992) "A neural network component for an intrusion detection system", In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. Defeng Wang, Yeung, D.S., and Tsang. E.C., (2007) WeightedMahalanobisDistance Kernels for