Survey on intrusion detection methods

Sanoop Mallissery, Jeevan Prabhu, Raghavendra Ganiga

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable. Intrusion detection systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. There are several reasons that make intrusion detection a necessary part of the entire defense system. This paper describes various Intrusion Detection methods like pattern matching, state full pattern matching, protocol decode-based analysis etc and how fuzzy clustering can apply in IDS.

Original languageEnglish
Title of host publication3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011
Pages224-228
Number of pages5
Volume2011
Edition2
DOIs
Publication statusPublished - 01-12-2011
Event3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011 - Bangalore, India
Duration: 14-09-201115-09-2011

Conference

Conference3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011
CountryIndia
CityBangalore
Period14-09-1115-09-11

Fingerprint

Intrusion detection
Pattern matching
Information systems
Fuzzy clustering
Access control
Authentication

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

Mallissery, S., Prabhu, J., & Ganiga, R. (2011). Survey on intrusion detection methods. In 3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011 (2 ed., Vol. 2011, pp. 224-228) https://doi.org/10.1049/ic.2011.0085
Mallissery, Sanoop ; Prabhu, Jeevan ; Ganiga, Raghavendra. / Survey on intrusion detection methods. 3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011. Vol. 2011 2. ed. 2011. pp. 224-228
@inproceedings{6e7ed5f958cb4d6fa035f16ef59dda87,
title = "Survey on intrusion detection methods",
abstract = "Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable. Intrusion detection systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. There are several reasons that make intrusion detection a necessary part of the entire defense system. This paper describes various Intrusion Detection methods like pattern matching, state full pattern matching, protocol decode-based analysis etc and how fuzzy clustering can apply in IDS.",
author = "Sanoop Mallissery and Jeevan Prabhu and Raghavendra Ganiga",
year = "2011",
month = "12",
day = "1",
doi = "10.1049/ic.2011.0085",
language = "English",
isbn = "9788191069181",
volume = "2011",
pages = "224--228",
booktitle = "3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011",
edition = "2",

}

Mallissery, S, Prabhu, J & Ganiga, R 2011, Survey on intrusion detection methods. in 3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011. 2 edn, vol. 2011, pp. 224-228, 3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011, Bangalore, India, 14-09-11. https://doi.org/10.1049/ic.2011.0085

Survey on intrusion detection methods. / Mallissery, Sanoop; Prabhu, Jeevan; Ganiga, Raghavendra.

3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011. Vol. 2011 2. ed. 2011. p. 224-228.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Survey on intrusion detection methods

AU - Mallissery, Sanoop

AU - Prabhu, Jeevan

AU - Ganiga, Raghavendra

PY - 2011/12/1

Y1 - 2011/12/1

N2 - Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable. Intrusion detection systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. There are several reasons that make intrusion detection a necessary part of the entire defense system. This paper describes various Intrusion Detection methods like pattern matching, state full pattern matching, protocol decode-based analysis etc and how fuzzy clustering can apply in IDS.

AB - Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable. Intrusion detection systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. There are several reasons that make intrusion detection a necessary part of the entire defense system. This paper describes various Intrusion Detection methods like pattern matching, state full pattern matching, protocol decode-based analysis etc and how fuzzy clustering can apply in IDS.

UR - http://www.scopus.com/inward/record.url?scp=84861602833&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84861602833&partnerID=8YFLogxK

U2 - 10.1049/ic.2011.0085

DO - 10.1049/ic.2011.0085

M3 - Conference contribution

AN - SCOPUS:84861602833

SN - 9788191069181

VL - 2011

SP - 224

EP - 228

BT - 3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011

ER -

Mallissery S, Prabhu J, Ganiga R. Survey on intrusion detection methods. In 3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011. 2 ed. Vol. 2011. 2011. p. 224-228 https://doi.org/10.1049/ic.2011.0085