Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Classification of Intrusion Detection System and its Methodologies

Author : Rahul Chandra Reddy Karne 1 Pasham Akhil Kumar Reddy 2 Ms. G. Pratibha 3

Date of Publication :7th August 2016

Abstract: The process of monitoring the network traffic within a host or on a network and detecting any unwanted or malicious traffic that might have crept in, is known as Intrusion Detection. An IDS may either be a piece of software or hardware appliance that keeps an eye on real-time network traffic so as to ascertain unwanted activities and occurrences such as illegal and vicious traffic, traffic that breaches established security policy, and traffic that violates passable use policies. This paper aims at delivering i) a general concept of types of IDS, pros and cons of the various available IDS ii) a description of different features of the IDS and IPS iii)attacks on IDS and how to evade IDS exploiting various security loop-holes. An IPS is a type of IDS which usually logs activities and identifies malicious activity which is reported so as to enact necessary counter measures.

Reference :

    1. Susan Hansche, “Official (ISC)2®,” Guide to the CISSP® -ISSEP®
    2. Michael E. Whitman, Herbert J. Mattord, “Principles of Information Security,” Fifth Edition, pp 355-389, 2015.
    3. Karen Scarfone, Peter Mell, Guide to Intrusion detection and prevention systems (IDPS), NIST, 1 to 127, 2007.
    4. Sans institute infosec reading room, Understanding Intrusion Detection System, Internet, Sans Institute, 1 to 9, 2001.
    5. B. Rajul and B. Srinivas, Network Intrusion Detection System Using KMP Pattern Matching Algorithm, IJCST, 33-36, January 2012.
    6. David Geer, Behaviour-Based Network Security Goes Mainstream, IEEE, 14-17, 1-5.
    7. Michael Gregg and Billy Haines, CASP: CompTia Advanced Security Practitioner Study Guide, pp.135- 137, 2013.
    8. Glen E. Clarke, CompTIA Security+ Certification Study Guide, Second Edition, pp 348-357, September 2014.
    9. Langin, C. L. A SOM+ Diagnostic System for Network Intrusion Detection. Ph.D. Dissertation, Southern Illinois University Carbondale, 2011.
    10. F. Cikala, R. Lataix, S. Marmeche", The IDS/IPS. Intrusion Detection/Prevention Systems ", Presentation, 2005.
    11. Tiwari Nitin, S. R. Singh and P. G. Singh, Intrusion Detection and Prevention System (IDPS) TechnologyNetwork Behavior Analysis System (NBAS), International Science Congress Association , 51-56, July 2012.

Recent Article