Towards Configured Intrusion Detection Systems

α
dr_.gagan_deep_sharma
dr_.gagan_deep_sharma
σ
Vivek Kumar
Vivek Kumar
ρ
Gagan Deep Sharma
Gagan Deep Sharma
α BBSB Engineering College, Fatehgarh Sahib

Send Message

To: Author

Towards Configured Intrusion Detection Systems

Article Fingerprint

ReserarchID

CSTNWSVH0EL

Towards Configured Intrusion Detection Systems Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

This paper studies the challenges in the current intrusion detection system and comparatively analyzes the active and passive response systems. The paper studies the existing IDS and their usefulness in detecting and preventing attacks in any type of network and control traffic with the performance of the system to be improved. The study also evaluates the emerging avenues in Intrusion Detection System and explores the possible future avenues in intrusion detection scheme. It is observed that the detection-based systems have started to gain popularity in the IT security domain. The paper highlights the need to implement an appropriately configured IDS since an optimally configured IDS deters hackers, thus, reducing the need for investigation by security experts for security violations.

References

16 Cites in Article
  1. James Anderson (1972). Computer Security Technology Planning Study. Volume 2.
  2. R Bace,P Mell (2001). NIST special publication on intrusion detection systems.
  3. J Balasubramaniyan,J Garcia-Fernandez,D Isacoff,E Spafford,D Zamboni (1998). An Architecture for Intrusion Detection Using Autonomous.
  4. M Botha,R Solms (2004). Utilizing Neural Networks For Effective Intrusion Detection.
  5. D Denning (1987). An Intrusion-Detection Model.
  6. J Gomez,D Dasgupta,O Nasraoui,F Gonzalez (2002). Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection.
  7. R Graham (2000). FAQ: Network Intrusion Detection Systems.
  8. M Hassan (2013). Current Studies on Intrusion Detection System, Genetic Algorithm And Fuzzy Logic.
  9. M Hoque,M Mukit,M Bikas (2012). An Implementation of Intrusion Detection System using Genetic Algorithm.
  10. S Institute (2001). Understanding Intrusion Detection Systems.
  11. K Scarfone,P Mell (2007). Intrusion Detection and Prevention Systems.
  12. M Shelke,M Sontakke,D Gawande (2012). Intrusion Detection System for Cloud Computing.
  13. S Snapp,J Brentano,G Dias,T Goan,T Grance,L Heberlein,C-L Ho,K Levitt,B Mukherjee,D Mansur,K Pon,S Smaha (2002). A system for distributed intrusion detection.
  14. P Tillapart,T Thumthawatworn,P Santiprabhob (2002). Fuzzy Intrusion Detection System.
  15. G Vigna,W Robertson,V Kher,R Kemmerer (2002). A Stateful Intrusion Detection System forWorld-Wide Web Servers.
  16. D Zamboni (2001). Using internal sensors for computer intrusion detection.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

dr_.gagan_deep_sharma. 2016. \u201cTowards Configured Intrusion Detection Systems\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 16 (GJCST Volume 16 Issue E4): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: C.2.1, C.2.2
Version of record

v1.2

Issue date

June 23, 2016

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 7442
Total Downloads: 1939
2026 Trends
Related Research

Published Article

This paper studies the challenges in the current intrusion detection system and comparatively analyzes the active and passive response systems. The paper studies the existing IDS and their usefulness in detecting and preventing attacks in any type of network and control traffic with the performance of the system to be improved. The study also evaluates the emerging avenues in Intrusion Detection System and explores the possible future avenues in intrusion detection scheme. It is observed that the detection-based systems have started to gain popularity in the IT security domain. The paper highlights the need to implement an appropriately configured IDS since an optimally configured IDS deters hackers, thus, reducing the need for investigation by security experts for security violations.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Towards Configured Intrusion Detection Systems

Vivek Kumar
Vivek Kumar
Gagan Deep Sharma
Gagan Deep Sharma

Research Journals