General study of intrusion detection system and survey of agent based intrusion detection system

A. Saxena, S. Sinha, P. Shukla
{"title":"General study of intrusion detection system and survey of agent based intrusion detection system","authors":"A. Saxena, S. Sinha, P. Shukla","doi":"10.1109/CCAA.2017.8229866","DOIUrl":null,"url":null,"abstract":"In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"59 1","pages":"471-421"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computing, Communication and Automation (ICCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCAA.2017.8229866","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23

Abstract

In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.
入侵检测系统概论及基于agent的入侵检测系统综述
在当今世界,对计算机安全最严重的威胁之一是非法侵入计算机系统。随着网络应用的快速增长,新型网络攻击也在不断涌现。入侵检测系统IDS用于检测扩展到公网的入侵活动。IDS可能需要处理不同的审计记录格式。入侵检测已成为检测对计算机网络和资源的攻击必不可少的安全工具。因此,我们对IDS进行了综述(一般研究)。首先,我们将讨论入侵检测,稍后将讨论入侵检测的类型。本文着重介绍了异常入侵、误用入侵、基于主机的入侵、基于网络的入侵和混合入侵,特别是基于异常的入侵和基于行为的入侵以及基于Agent技术的入侵。最后,介绍了各类入侵检测系统的贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信