Abstract
Network security in organizations is not limited to tangible systems but beyond the physical existence, its focusing on security of non-tangible data flowing in network inside and outside of organization while communicating through Internet. In this paper, we will discuss about different types of intrusion detection system (IDS) available and comparison of their various aspects. Finally, I propose my research work as intrusion filtration system (IFS), which will be a new methodology for network security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Denning Dorothy (1987) An intrusion-detection model. IEEE Trans Softw Eng 13(2):222–232
Rathore JS (2012) Survey on intrusion detection and prevention system and proposed cost effective solution using software agent 1(3)
Kaur T, Kaur S (2013) Comparative analysis of anomaly based and signature based intrusion detection systems using PHAD and Snort. In: Proceeding of security and privacy symposium, Feb 28 to Mar 2
Ghassemian M (2011) Analysis of an anomaly-based intrusion detection system for wireless sensor networks. Int J Comput Appl (0975 – 8887) 28(7)
Jyothsna V, Rangampet A, Rama Prasad VV (2011) A review of anomaly based intrusion detection systems. Int J Comput Appl 28(7):26–35
Patil S, Meshram BB (2012) Network intrusion detection and prevention techniques for DoS attacks. In J Sci Res Publ 2(7)
Debar H (2000) An introduction to intrusion-detection systems. In: Proceedings of connect
Schaelicke L, Slabach T, Moore BJ, Freeland C (2003) Characterizing the performance of network intrusion detection sensors. In: RAID. Lecture notes in computer science, vol 2820. Springer, pp 155–172
Vigna G, Kruegel C (2005) Host based intrusion detection. In: Handbook of information security. Wiley, Dec 2005
Albag H, Network & agent based intrusion detection systems. Istanbul Technical University, TU Munich
Intrusion detection—systems for today and tomorrow. In: SANS institute 2001
Whitea JS, Fitzsimmonsb TT, Matthewsca JN, Coulter WH (2013) Quantitative analysis of intrusion detection systems: Snort and Suricata. In: Proceedings of the SPIE, vol 8757, id. 875704, 12Â pp
Red Hat Enterprise Linux 4, Security Guide. http://www.centos.org
Evaluating-intrusion-detection-systems-and-comparison-of-intrusion-detection-techniques-in-detecting. http://www.intechopen.com
Jacob VÃctor G, Rao Meda S, Venkaiah VCH (2010) False positives in intrusion detection systems. http://www.academia.edu
Dreger H, Kreibich C, Paxson V, Sommer R (2005) Enhancing the accuracy of network-based intrusion detection with host-based context. In: Proceedings of the second international conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 206–221
Debar H, Dacier M, Wespi A Towards a taxonomy of intrusion-detection systems. Int J Comput Telecommun Networking—Spec Issue Comput Netw Secur Arch 31(9):805–822 (1999) (Elsevier)
Intrusion detection systems: definition, need and challenges. In: SANS institute 2001
Karthikeyan KR, Indra A (2010) Intrusion detection tools and techniques—a survey 2(6)
Petersen C (2003) An introduction to network and host based intrusion detection
Sandhu UA, Haider S, Naseer S, Ateeb OU (2011) A survey of intrusion detection & prevention techniques. In: IPCSIT, vol 16. IACSIT Press, Singapore 2011
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dewanjee, R., Vyas, R. (2017). A Study on IDS (Intrusion Detection System) and Introduction of IFS (Intrusion Filtration System). In: Vishwakarma, H., Akashe, S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12. Springer, Singapore. https://doi.org/10.1007/978-981-10-3935-5_13
Download citation
DOI: https://doi.org/10.1007/978-981-10-3935-5_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3934-8
Online ISBN: 978-981-10-3935-5
eBook Packages: EngineeringEngineering (R0)