2014
DOI: 10.5815/ijcnis.2014.09.07
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Intrusion Detection Techniques: A Survey

Abstract: Networking has become the most integral part of our cyber society. Everyone wants to connect themselves with each other. With the advancement of network technology, we find this most vulnerable to breach and take information and once information reaches to the wrong hands it can do terrible things. During recent years, number of attacks on networks have been increased which drew the attention of many researchers on this field. There have been many researches on intrusion detection lately. Many methods have bee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 9 publications
0
9
0
2
Order By: Relevance
“…With the help of this application IDS supervises and examines the packets moving on network through interface. An agent supervises the operating system and preserves data in terms of log files and also generate alert by using alarm function [4,5].…”
Section: Host Base Idsmentioning
confidence: 99%
See 1 more Smart Citation
“…With the help of this application IDS supervises and examines the packets moving on network through interface. An agent supervises the operating system and preserves data in terms of log files and also generate alert by using alarm function [4,5].…”
Section: Host Base Idsmentioning
confidence: 99%
“…The Network IDS is located in the network section which supervises traffic which is moving on the network [4,5].…”
Section: Network Base Idsmentioning
confidence: 99%
“…In anomaly-Based detection scheme any action that is different from the normal behaviour is termed as anomaly. It checks for the normal and abnormal behaviour of the system [3].It classifies using rules or heuristics.…”
Section: Introductionmentioning
confidence: 99%
“…Seeing that the children nodes of node G 1 share a disjunctive OR association, the attack path through this node avails the attacker two options of either using malware or intruding malware-less denoted by nodes G 4 and G 3 respectively. These two nodes contain respective atomic attacks which would otherwise act as the basic actions described earlier in our attack model.…”
Section: B Attack Tree Modelingmentioning
confidence: 99%
“…Regardless of whether a given attack is of the former or latter class, it can be deemed as either outsider or insider attack [4]. Therefore, depending onto which category an attack falls, it will utilize different facets of attack vectors to accomplish the overall objective.…”
Section: Introductionmentioning
confidence: 99%