{"title":"A Hybrid Approach for Network Intrusion Detection","authors":"G. P. Rout, S. Mohanty","doi":"10.1109/CSNT.2015.76","DOIUrl":null,"url":null,"abstract":"An Intrusion detection system (IDS) monitors network traffic and system activities and report to administrator. In some cases the intrusion detection may also respond to anomalous or malicious traffic by taking action such as blocking of user or source address from accessing the network. IDS comes in variety of flavor but its goals to detecting suspicious traffic in different ways. There are network based and host based intrusion detection system. The IDS is detecting based looking for specific signature of known threats as it antivirus and firewall. The anomaly detection is used to comparing traffics against the baseline. The detection is described briefly in this paper using fuzzy and genetic algorithm.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on Communication Systems and Network Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT.2015.76","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 25
Abstract
An Intrusion detection system (IDS) monitors network traffic and system activities and report to administrator. In some cases the intrusion detection may also respond to anomalous or malicious traffic by taking action such as blocking of user or source address from accessing the network. IDS comes in variety of flavor but its goals to detecting suspicious traffic in different ways. There are network based and host based intrusion detection system. The IDS is detecting based looking for specific signature of known threats as it antivirus and firewall. The anomaly detection is used to comparing traffics against the baseline. The detection is described briefly in this paper using fuzzy and genetic algorithm.