Survey on intrusion detection methods

Sanoop Mallissery*, Jeevan Prabhu, Raghavendra Ganiga

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable. Intrusion detection systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. There are several reasons that make intrusion detection a necessary part of the entire defense system. This paper describes various Intrusion Detection methods like pattern matching, state full pattern matching, protocol decode-based analysis etc and how fuzzy clustering can apply in IDS.

    Original languageEnglish
    Title of host publication3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011
    Pages224-228
    Number of pages5
    Volume2011
    Edition2
    DOIs
    Publication statusPublished - 01-12-2011
    Event3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011 - Bangalore, India
    Duration: 14-09-201115-09-2011

    Publication series

    NameIET Seminar Digest
    Number2
    Volume2011

    Conference

    Conference3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011
    Country/TerritoryIndia
    CityBangalore
    Period14-09-1115-09-11

    All Science Journal Classification (ASJC) codes

    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Survey on intrusion detection methods'. Together they form a unique fingerprint.

    Cite this