Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
A Survey on Various Techniques for Classifying Attacks in NIDS
Ruchira Gurav, Aparna Junnarkar
Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion. IDSs are based on the belief that an intruders behavior will be noticeably different from that of a legitimate user. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious attacks by using traditional statistical methods to new data mining approaches in last decades.The conventional system is not efficient for unseen data and they need to be updated frequently to work properly. There are several techniques which classify data into only normal and threat or attack type, further classification is not done which leads to less accuracy. In several approaches dimensionality of input set is large which makes the problem complex and redundancy might increase. So basically in todays world of internet and automation, it is important to maintain a security, authenticity. There must be a proper efficient technique which can detect attacks and classify them into proper attack categories. The further classification into sub-attack categories plays a vital role in IDS as likewise preventive actions can be taken. So basically in this paper we are going to focus on various techniques for classifying attacks in NIDS.
Keywords: Intrusion Detection System, Promiscuous mode, dimensionality, alerts, legitimate user
Edition: Volume 3 Issue 11, November 2014
Pages: 2195 - 2197
How to Cite this Article?
Ruchira Gurav, Aparna Junnarkar, "A Survey on Various Techniques for Classifying Attacks in NIDS ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141511, Volume 3 Issue 11, November 2014, 2195 - 2197
92 PDF Views | 90 PDF Downloads
Similar Articles with Keyword 'Intrusion Detection System'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2025 - 2030Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System
Hardik M. Shingala, Mukesh Sakle
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1440 - 1445Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1571 - 1574Energy Efficient Secure Routing using Clustering Approach in HWSN
Shani Verma, Maya Shelke
Similar Articles with Keyword 'dimensionality'
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2253 - 2256Survey on Hubness - Based Clustering Algorithms
Nikita Dhamal, Antara Bhatttacharya
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1907 - 1913Human Gait Recognition Using Multisvm Classifier
Saranya Sasidharan, Smitha K S, Minu Thomas
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1715 - 1717Survey Paper on Fault Detection in Sensor Data
Vidya D. Omase, Jyoti N. Nandimath
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 820 - 824Clustering Medical Data Using Subspace and Parallel Approximation Algorithm
B. Thenmozhi, P. Shanthi
Similar Articles with Keyword 'alerts'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1011 - 1014Temperature Monitoring and Alert Generation System ? An IoT Implementation
Shardul S. Thakre, Pratik S. Jain
Dissertation Chapters, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1664 - 1669Online Intrusion Alert Aggregation with GDSM
Borhade Sushama R, Chandre P.R
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3090 - 3092Location Based Intelligent Mobile Organizer
Kulkarni G. R., Pawar S. C., More B.M.
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 369 - 372Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception
Neelutpol Gogoi, M. N. Sushmitha
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2195 - 2197A Survey on Various Techniques for Classifying Attacks in NIDS
Ruchira Gurav, Aparna Junnarkar
Similar Articles with Keyword 'legitimate user'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1612 - 1616Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
Vishal Mahale, Deepali Gothawal
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1156 - 1158Revisiting Defenses against Large-Scale Online Password Guessing Attacks
Ravi Kumar Yalagandala, Dr. N. Chandra Sekhar Reddy
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1940 - 1943Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment
Mojtaba Mohamamdi, Keshav Kishore