Performance of an Intrusion Detection System under Different Techniques

作者: Sadeq AlHamouz

DOI:

关键词:

摘要: Nowadays, with the rapid growth in technologies, which depend on computers systems and networks, threats are also increasing enormously. So, a huge number of approaches have been developed to protect networks increase security since it is an essential requirement majority applications. In this paper, statistical Naive Bayesian method applied IDS system using different scenarios. The performance measured through experiments NSL-KDD dataset.

参考文章(19)
William Stallings, Cryptography and network security ,(1998)
Dominique Alessandri, Attack-class-based analysis of intrusion detection systems Newcastle University. ,(2004)
Vern Paxson, Anja Feldmann, Holger Dreger, Robin Sommer, Michael Mai, Dynamic application-layer protocol analysis for network intrusion detection usenix security symposium. pp. 18- ,(2006)
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Uwe Aickelin, Jamie Twycross, Thomas Hesketh Roberts, Rule generalisation in intrusion detection systems using SNORT International Journal of Electronic Security and Digital Forensics. ,vol. 1, pp. 101- 116 ,(2007) , 10.1504/IJESDF.2007.013596
Guillaume Dewaele, Kensuke Fukuda, Pierre Borgnat, Patrice Abry, Kenjiro Cho, Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures acm special interest group on data communication. pp. 145- 152 ,(2007) , 10.1145/1352664.1352675
P. Gogoi, D. K. Bhattacharyya, B. Borah, J. K. Kalita, MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method The Computer Journal. ,vol. 57, pp. 602- 623 ,(2014) , 10.1093/COMJNL/BXT044
N. Ye, S.M. Emran, Q. Chen, S. Vilbert, Multivariate statistical analysis of audit trails for host-based intrusion detection IEEE Transactions on Computers. ,vol. 51, pp. 810- 820 ,(2002) , 10.1109/TC.2002.1017701
Jiankun Hu, Host-Based Anomaly Intrusion Detection Handbook of Information and Communication Security. pp. 235- 255 ,(2010) , 10.1007/978-3-642-04117-4_13