Anomaly Intrusion Detection Techniques: A Brief Review

نویسندگان

  • Anurag Jain
  • Bhupendra Verma
  • J. L. Rana
چکیده

In a broader sense detection of any unauthorized access of any information system is the basic aim of any intrusion detection system. However due to cost considerations it is practically impossible to provide total protection to an information system from intrusion for its entire useful life time. In this paper we provide a brief introduction to anomaly based intrusion detection systems that classify all reported techniques, including artificial immune systems (AIS), fuzzy logic (FL), swarm intelligence (SI), artificial neural networks (ANN), evolutionary computation (EC), and soft computing (SC). The various techniques of anomaly based intrusion detection system reported in the literature have been sorted out on the parameters like their strength and weakness. The important research contributions have been systematically compared and summarized to reflect the current status of research and challenges ahead. This will be helpful in knowing the new research directions. We also highlight the role of machine learning techniques for IDS. The contributions of research papers based on machine learning (ML) have also been considered. ML system have intrinsic properties like resilience to noisy data, adaptability, fault tolerance, robustness, low computational overhead etc, that provide a versatile tool in developing better intrusion detection techniques. We aim at providing a concise but comprehensive overview of research in progress and give direction to intrusion detection methods based on ensemble of ML techniques. This review work should be helpful and also provide critical insight into the current trend in IDS research especially in the application of ML approaches to IDS and related fields.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

Audit Records Statistical Anomaly Detection Rule-based Intrusion Detection the Base-rate Fallacy Distributed Intrusion Detection Honeypots Intrusion Detection Exchange Format

20.1 Intruders Intruder Behavior Patterns Intrusion Techniques 20.2 Intrusion Detection Audit Records Statistical Anomaly Detection Rule-Based Intrusion Detection The Base-Rate Fallacy Distributed Intrusion Detection Honeypots Intrusion Detection Exchange Format 20.3 Password Management Password Protection Password Selection Strategies 20.4 Recommended Reading and Web Sites 20.5 Key Terms, Revi...

متن کامل

A Survey on Intrusion Detection in Wireless Sensor Networks

In recent years, the applications based on the Wireless Sensor Networks are growing very fast. The application areas include agriculture, healthcare, military, hospitality management, mobiles and many others. So these networks are very important for us and the security of the network from the various attacks is also a more important issue in WSN application now days. Stopping these attacks or e...

متن کامل

A Review of Machine Learning based Anomaly Detection Techniques

Intrusion detection is so much popular since the last two decades where intrusion is attempted to break into or misuse the system. It is mainly of two types based on the intrusions, first is Misuse or signature based detection and the other is Anomaly detection. In this paper Machine learning based methods which are one of the types of Anomaly detection techniques is discussed.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014