DocumentCode :
1981674
Title :
Survey on intrusion detection methods
Author :
Mallissery, S. ; Prabhu, J. ; Ganiga, R.
Author_Institution :
Dept. of Inf. & Commun. Technol., MIT, Manipal, India
fYear :
2011
fDate :
14-15 Nov. 2011
Firstpage :
224
Lastpage :
228
Abstract :
Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder´s behavior will be noticeably different from that of a legitimate user and that many unauthorized actions will be detectable. Intrusion detection systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. There are several reasons that make intrusion detection a necessary part of the entire defense system. This paper describes various Intrusion Detection methods like pattern matching, state full pattern matching, protocol decode-based analysis etc and how fuzzy clustering can apply in IDS.
Keywords :
authorisation; fuzzy set theory; IDS; access control; authentication; fuzzy clustering; information system; intrusion detection methods; intrusion detection systems; intrusion identification; preventive security mechanisms; security policy; Fuzzy Clustering; Integrated Service Checker; Intrusion; Protocol Decode-Based Analysis;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Advances in Recent Technologies in Communication and Computing (ARTCom 2011), 3rd International Conference on
Conference_Location :
Bangalore
Type :
conf
DOI :
10.1049/ic.2011.0085
Filename :
6193574
Link To Document :
بازگشت