TY - GEN
T1 - Survey on intrusion detection methods
AU - Mallissery, Sanoop
AU - Prabhu, Jeevan
AU - Ganiga, Raghavendra
PY - 2011/12/1
Y1 - 2011/12/1
N2 - Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable. Intrusion detection systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. There are several reasons that make intrusion detection a necessary part of the entire defense system. This paper describes various Intrusion Detection methods like pattern matching, state full pattern matching, protocol decode-based analysis etc and how fuzzy clustering can apply in IDS.
AB - Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable. Intrusion detection systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. There are several reasons that make intrusion detection a necessary part of the entire defense system. This paper describes various Intrusion Detection methods like pattern matching, state full pattern matching, protocol decode-based analysis etc and how fuzzy clustering can apply in IDS.
UR - https://www.scopus.com/pages/publications/84861602833
UR - https://www.scopus.com/inward/citedby.url?scp=84861602833&partnerID=8YFLogxK
U2 - 10.1049/ic.2011.0085
DO - 10.1049/ic.2011.0085
M3 - Conference contribution
AN - SCOPUS:84861602833
SN - 9788191069181
VL - 2011
T3 - IET Seminar Digest
SP - 224
EP - 228
BT - 3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011
T2 - 3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011
Y2 - 14 September 2011 through 15 September 2011
ER -