International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 90 - Issue 8 |
Published: March 2014 |
Authors: Samarjeet Borah, Anindita Chakraborty |
![]() |
Samarjeet Borah, Anindita Chakraborty . Towards the Development of an Efficient Intrusion Detection System. International Journal of Computer Applications. 90, 8 (March 2014), 15-20. DOI=10.5120/15593-4314
@article{ 10.5120/15593-4314, author = { Samarjeet Borah,Anindita Chakraborty }, title = { Towards the Development of an Efficient Intrusion Detection System }, journal = { International Journal of Computer Applications }, year = { 2014 }, volume = { 90 }, number = { 8 }, pages = { 15-20 }, doi = { 10.5120/15593-4314 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2014 %A Samarjeet Borah %A Anindita Chakraborty %T Towards the Development of an Efficient Intrusion Detection System%T %J International Journal of Computer Applications %V 90 %N 8 %P 15-20 %R 10.5120/15593-4314 %I Foundation of Computer Science (FCS), NY, USA
Intrusion is a set of related activities which is performed to provide unauthorized activities such as access to the useful information, file modification etc. It is a set of any actions that attempt to compromise the integrity, confidentiality, or availability of a computer resource. Intrusion Detection Systems (IDS) are used to monitor and detect the probable attempts of such types. An IDS collects system and network activity related data. These data may contain network attacks against vulnerable services, data driven attacks on applications, host based attacks etc. There are several IDSs in literature proposed using various computational techniques such as statistical methods, artificial intelligence, data mining etc. Among these, data mining based methods are comparatively more successful in detecting unknown attack patterns. This paper reviews some remarkable works from the literature along with the basic concepts of intrusion detection. It also includes some suggestions for developing an efficient IDS based on the analysis carried out