A Survey on Various Techniques for Classifying Attacks in NIDS
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Ruchira Gurav; Aparna Junnarkar;
Page : 2195-2197
Keywords : Intrusion Detection System; Promiscuous mode; dimensionality; alerts; legitimate user;
Abstract
Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion. IDSs are based on the belief that an intruders behavior will be noticeably different from that of a legitimate user. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious attacks by using traditional statistical methods to new data mining approaches in last decades. The conventional system is not efficient for unseen data and they need to be updated frequently to work properly. There are several techniques which classify data into only normal and threat or attack type, further classification is not done which leads to less accuracy. In several approaches dimensionality of input set is large which makes the problem complex and redundancy might increase. So basically in todays world of internet and automation, it is important to maintain a security, authenticity. There must be a proper efficient technique which can detect attacks and classify them into proper attack categories. The further classification into sub-attack categories plays a vital role in IDS as likewise preventive actions can be taken. So basically in this paper we are going to focus on various techniques for classifying attacks in NIDS.
Other Latest Articles
- Blind Image / Video Quality Assessment Based on DCT-Domain Statistics
- Kinetics and Equilibrium Isotherm Studies of Endrin and o, p DDT Adsorption on Low Cost Adsorbent, Parthenium hysterophorous Activated with Nitric Acid and Methanol
- Non Dietary Factors Associated with Iron Deficiency Anemia among Infants Aged Six to Nine Months in Keiyo South Sub County Kenya
- Analysis and Comparison of APOD and PD PWM technique CHB Inverter to Three Phase Induction Machine
- A Review on Conversion of Image to Text As Well As Speech Using Edge Detection and Image Segmentation
Last modified: 2021-06-30 21:12:54