A Review On Network intrusion detection System Using Different Technique
Authors: Pragya Chhabra, Mrs. NishaBhati
Certificate: View Certificate
Abstract
The computer network and internet networks are exposed to an increasing number of security threats. Intrusion Detection System plays a very important role in network security. Its main role in the network is to help computer system to create and deal with network attacks. For new types of attacks are emerging constantly, developing flexibility and adaptability safety-oriented approaches is a serious problem. In past few years, intrusion detection using data mining has captured the attention of researchers. Every researcher proposes a different algorithm for distinct categories. The increase speed of data flow information and also development in communication network along with many factors there is possibility of number of attacks on computer system. This paper provides us overview of intrusion detection system and various techniques used to implement intrusion detection system.
Introduction
The cost of data information processing and downs availability of the Internet system, the organizations are still vulnerable to potential cyber threats, are network attacks. The computer intrusion is actions that violate the security of the system. Such situation must be detected and corrected in order to guarantee the integrity, confidentiality and/or the availability of computing resources. Intrusion Detection System (IDS) is used to detect the intrusion which can be in form of an anomaly in the network and alert the user about the same. Intrusion detection system is mainly of two types firstly there is Signature based systems and second one is the Anomaly detection. The Signature based Intrusion Detection System (IDS) monitors packets in the network and compares them to the known signatures which are pre-configured and preidentified based on attack behavior of previously known attacks. On the other hand the anomaly based Intrusion Detection System monitors the normal network traffic such as bandwidth range, types of protocols, ports and devices used to connect and sends an alert to the administrator on detection of anomalous behavior. The signature based IDS detects attacks on the known attack signature type. Advantage of this type of system is that it can detect known attacks with low error rate, but it cannot detect the newly created attacks that do not have similar behavior to known attacks. In contrast Anomaly based IDS can be useful in identifying the new attack pattern, but in this case the error rate is higher. Thus in order to solve the above two limitations we are building a hybrid intrusion detection method that combines misuse detection method and anomaly detection method has been proposed. In this review paper we are going to review the existing IDS methods and techniques and network attacks only.
Conclusion
The various papers and literature has been studied for intrusion detection system. In this paper, we have discussed the internet and commuter network, various types of attacks that hamper the security of the network security, intrusion detection system (IDS) to monitor and analyze the attacks. Research findings of different authors have been discussed and the future research scope is discussed.
Copyright
Copyright © 2025 Pragya Chhabra, Mrs. NishaBhati. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.