Survey on intrusion detection methods

Sanoop Mallissery, Jeevan Prabhu, Raghavendra Ganiga

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable. Intrusion detection systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. There are several reasons that make intrusion detection a necessary part of the entire defense system. This paper describes various Intrusion Detection methods like pattern matching, state full pattern matching, protocol decode-based analysis etc and how fuzzy clustering can apply in IDS.

Original languageEnglish
Title of host publication3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011
Pages224-228
Number of pages5
Volume2011
Edition2
DOIs
Publication statusPublished - 01-12-2011
Event3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011 - Bangalore, India
Duration: 14-09-201115-09-2011

Conference

Conference3rd International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2011
Country/TerritoryIndia
CityBangalore
Period14-09-1115-09-11

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Survey on intrusion detection methods'. Together they form a unique fingerprint.

Cite this