Skip to main content

A Study on IDS (Intrusion Detection System) and Introduction of IFS (Intrusion Filtration System)

  • Conference paper
  • First Online:
Computing and Network Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 12))

  • 829 Accesses

Abstract

Network security in organizations is not limited to tangible systems but beyond the physical existence, its focusing on security of non-tangible data flowing in network inside and outside of organization while communicating through Internet. In this paper, we will discuss about different types of intrusion detection system (IDS) available and comparison of their various aspects. Finally, I propose my research work as intrusion filtration system (IFS), which will be a new methodology for network security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Denning Dorothy (1987) An intrusion-detection model. IEEE Trans Softw Eng 13(2):222–232

    Article  Google Scholar 

  2. Rathore JS (2012) Survey on intrusion detection and prevention system and proposed cost effective solution using software agent 1(3)

    Google Scholar 

  3. Kaur T, Kaur S (2013) Comparative analysis of anomaly based and signature based intrusion detection systems using PHAD and Snort. In: Proceeding of security and privacy symposium, Feb 28 to Mar 2

    Google Scholar 

  4. Ghassemian M (2011) Analysis of an anomaly-based intrusion detection system for wireless sensor networks. Int J Comput Appl (0975 – 8887) 28(7)

    Google Scholar 

  5. Jyothsna V, Rangampet A, Rama Prasad VV (2011) A review of anomaly based intrusion detection systems. Int J Comput Appl 28(7):26–35

    Google Scholar 

  6. Patil S, Meshram BB (2012) Network intrusion detection and prevention techniques for DoS attacks. In J Sci Res Publ 2(7)

    Google Scholar 

  7. Debar H (2000) An introduction to intrusion-detection systems. In: Proceedings of connect

    Google Scholar 

  8. Schaelicke L, Slabach T, Moore BJ, Freeland C (2003) Characterizing the performance of network intrusion detection sensors. In: RAID. Lecture notes in computer science, vol 2820. Springer, pp 155–172

    Google Scholar 

  9. Vigna G, Kruegel C (2005) Host based intrusion detection. In: Handbook of information security. Wiley, Dec 2005

    Google Scholar 

  10. Albag H, Network & agent based intrusion detection systems. Istanbul Technical University, TU Munich

    Google Scholar 

  11. Intrusion detection—systems for today and tomorrow. In: SANS institute 2001

    Google Scholar 

  12. Whitea JS, Fitzsimmonsb TT, Matthewsca JN, Coulter WH (2013) Quantitative analysis of intrusion detection systems: Snort and Suricata. In: Proceedings of the SPIE, vol 8757, id. 875704, 12 pp

    Google Scholar 

  13. Red Hat Enterprise Linux 4, Security Guide. http://www.centos.org

  14. Evaluating-intrusion-detection-systems-and-comparison-of-intrusion-detection-techniques-in-detecting. http://www.intechopen.com

  15. Jacob Víctor G, Rao Meda S, Venkaiah VCH (2010) False positives in intrusion detection systems. http://www.academia.edu

  16. Dreger H, Kreibich C, Paxson V, Sommer R (2005) Enhancing the accuracy of network-based intrusion detection with host-based context. In: Proceedings of the second international conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 206–221

    Google Scholar 

  17. Debar H, Dacier M, Wespi A Towards a taxonomy of intrusion-detection systems. Int J Comput Telecommun Networking—Spec Issue Comput Netw Secur Arch 31(9):805–822 (1999) (Elsevier)

    Google Scholar 

  18. Intrusion detection systems: definition, need and challenges. In: SANS institute 2001

    Google Scholar 

  19. Karthikeyan KR, Indra A (2010) Intrusion detection tools and techniques—a survey 2(6)

    Google Scholar 

  20. Petersen C (2003) An introduction to network and host based intrusion detection

    Google Scholar 

  21. Sandhu UA, Haider S, Naseer S, Ateeb OU (2011) A survey of intrusion detection & prevention techniques. In: IPCSIT, vol 16. IACSIT Press, Singapore 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rita Dewanjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Dewanjee, R., Vyas, R. (2017). A Study on IDS (Intrusion Detection System) and Introduction of IFS (Intrusion Filtration System). In: Vishwakarma, H., Akashe, S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12. Springer, Singapore. https://doi.org/10.1007/978-981-10-3935-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3935-5_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3934-8

  • Online ISBN: 978-981-10-3935-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics