Intrusion Detection Using Neural Network: A Literature Review
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | Sudan | Volume 6 Issue 9, September 2017

Intrusion Detection Using Neural Network: A Literature Review

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi

Nowadays the computer security is important in our society,. Because of the wide use of computer networks and its application, it becomes imperative to detect the network attacks to protect the information security.therefor, anyone using a computer is at some risk of intrusion, even if he is not connected to the Internet or any other network. If the computer is left unattended, any person can attempt to access and misuse the system. The problem is, however, greater if the computer is connected to a network, especially the Internet. Any user from any place in the world can reach the computer remotely and may attempt to access private information. Solving the problem of attack detection using intrusion detection against computer networks is being a major problem in the area of network security. The intrusion detection system meets some challenges, and there are different approaches to deal with these challenges, neural network and machine learning is the best approaches to deal with it. In this paper we will illustrate different approaches of Intrusion detection system using neural network in briefly, and their advantages and disadvantages.

Keywords: intrusion detection system, HIDS, NIDS, Hybrid IDS, anomaly detection, misuse detection

Edition: Volume 6 Issue 9, September 2017

Pages: 343 - 347

Share this Article

How to Cite this Article?

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi, "Intrusion Detection Using Neural Network: A Literature Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=4091703, Volume 6 Issue 9, September 2017, 343 - 347

59 PDF Views | 47 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'intrusion detection system'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 422 - 426

Secure Detection and Prevention Scheme for Jamming Attack in MANET

Ashwini Magardey, Dr. Tripti Arjariya

Share this Article

Similar Articles with Keyword 'HIDS'

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 9, September 2017

Pages: 343 - 347

Intrusion Detection Using Neural Network: A Literature Review

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi

Share this Article

Similar Articles with Keyword 'NIDS'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2195 - 2197

A Survey on Various Techniques for Classifying Attacks in NIDS

Ruchira Gurav, Aparna Junnarkar

Share this Article

Survey Paper, Computer Science & Engineering, Tanzania, Volume 3 Issue 10, October 2014

Pages: 747 - 751

A Survey of Intrusion Detection on Spontaneous Wireless Adhoc Networks

Thangaraj E, Arockia Jayadhas S

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 9, September 2017

Pages: 343 - 347

Intrusion Detection Using Neural Network: A Literature Review

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi

Share this Article

Similar Articles with Keyword 'Hybrid IDS'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 9, September 2017

Pages: 343 - 347

Intrusion Detection Using Neural Network: A Literature Review

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi

Share this Article

Similar Articles with Keyword 'anomaly detection'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1825 - 1828

Link-Anomaly Detection in Twitter Streams

Shari P S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 4 Issue 4, April 2015

Pages: 742 - 748

Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques

Ayad Mohammed Mahyoub Ghaleb, Samani A. Talab

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2021 - 2023

Survey on Temporal Patterns in Physiological Sensor Data

Nilam

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2677 - 2680

Survey of Novel Method for Online Classification in Data Mining

Jadhav Bharat S, Gumaste S.V.

Share this Article

Similar Articles with Keyword 'misuse detection'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 4 Issue 4, April 2015

Pages: 742 - 748

Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques

Ayad Mohammed Mahyoub Ghaleb, Samani A. Talab

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3151 - 155

A Survey: Recent Autonomous Security Techniques for Detection & Avoidance of Network Attacks

Supriya Gupta, Ankur Goyal

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1608 - 1614

Optimizing Data Misuse Detection by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent

Sangramsinh Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 9, September 2017

Pages: 343 - 347

Intrusion Detection Using Neural Network: A Literature Review

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi

Share this Article
Top