2010
DOI: 10.5120/563-745
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of Mechanisms for Making IDS Fault Tolerant

Abstract: This paper is a survey of the work, done for making an IDS fault tolerant. IDS are prone to various attacks and it becomes the natural primary target of hostile attacks with the aim of disabling the detection feature and allowing an attacker to operate without being detected. This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subvert the IDS then attack the target system at will. Making an IDS fault tolerant is a challenging task.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
(12 reference statements)
0
2
0
Order By: Relevance
“…Our models have been trained to detect the 14 up-to-date and well-known type of attacks. Furthermore, fault tolerance can be achieved by adopting the majority voting technique [52]. The trained models of Random Forest, Bayesian Network, and LDA can be used in a majority voting-based intrusion detection system that can adapt fault tolerance.…”
Section: Fault Tolerancementioning
confidence: 99%
“…Our models have been trained to detect the 14 up-to-date and well-known type of attacks. Furthermore, fault tolerance can be achieved by adopting the majority voting technique [52]. The trained models of Random Forest, Bayesian Network, and LDA can be used in a majority voting-based intrusion detection system that can adapt fault tolerance.…”
Section: Fault Tolerancementioning
confidence: 99%
“…In this section, we review some interesting works in these areas. Kaur et al (2010) analysed and discussed one of the most challenging issues in the field of intrusion detection, which is the IDS' fault tolerance. For instance, they evaluated some of the widely used fault tolerance mechanisms, namely replication of software agents, employment of redundancy in processing elements, integrity checking for selfhealing, use of reconfigurable hardware and restructuring architectures, and fault detection using heartbeat messages in multi-agent systems.…”
Section: Related Workmentioning
confidence: 99%