A Survey on Various Techniques for Classifying Attacks in NIDS
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Survey on Various Techniques for Classifying Attacks in NIDS

Ruchira Gurav, Aparna Junnarkar

Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion. IDSs are based on the belief that an intruders behavior will be noticeably different from that of a legitimate user. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious attacks by using traditional statistical methods to new data mining approaches in last decades.The conventional system is not efficient for unseen data and they need to be updated frequently to work properly. There are several techniques which classify data into only normal and threat or attack type, further classification is not done which leads to less accuracy. In several approaches dimensionality of input set is large which makes the problem complex and redundancy might increase. So basically in todays world of internet and automation, it is important to maintain a security, authenticity. There must be a proper efficient technique which can detect attacks and classify them into proper attack categories. The further classification into sub-attack categories plays a vital role in IDS as likewise preventive actions can be taken. So basically in this paper we are going to focus on various techniques for classifying attacks in NIDS.

Keywords: Intrusion Detection System, Promiscuous mode, dimensionality, alerts, legitimate user

Edition: Volume 3 Issue 11, November 2014

Pages: 2195 - 2197

Share this Article

How to Cite this Article?

Ruchira Gurav, Aparna Junnarkar, "A Survey on Various Techniques for Classifying Attacks in NIDS ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141511, Volume 3 Issue 11, November 2014, 2195 - 2197

92 PDF Views | 90 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Intrusion Detection System'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1571 - 1574

Energy Efficient Secure Routing using Clustering Approach in HWSN

Shani Verma, Maya Shelke

Share this Article

Similar Articles with Keyword 'dimensionality'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 890 - 894

A Survey on Types of Crawlers and Web Searching Algorithms

T. Yogameera, Dr. D. Shanthi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2253 - 2256

Survey on Hubness - Based Clustering Algorithms

Nikita Dhamal, Antara Bhatttacharya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1907 - 1913

Human Gait Recognition Using Multisvm Classifier

Saranya Sasidharan, Smitha K S, Minu Thomas

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1715 - 1717

Survey Paper on Fault Detection in Sensor Data

Vidya D. Omase, Jyoti N. Nandimath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 820 - 824

Clustering Medical Data Using Subspace and Parallel Approximation Algorithm

B. Thenmozhi, P. Shanthi

Share this Article

Similar Articles with Keyword 'alerts'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1011 - 1014

Temperature Monitoring and Alert Generation System ? An IoT Implementation

Shardul S. Thakre, Pratik S. Jain

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1664 - 1669

Online Intrusion Alert Aggregation with GDSM

Borhade Sushama R, Chandre P.R

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3090 - 3092

Location Based Intelligent Mobile Organizer

Kulkarni G. R., Pawar S. C., More B.M.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 369 - 372

Traffic Statistics Determination of Unified Threat Manager to Provide Threat Perception

Neelutpol Gogoi, M. N. Sushmitha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2195 - 2197

A Survey on Various Techniques for Classifying Attacks in NIDS

Ruchira Gurav, Aparna Junnarkar

Share this Article

Similar Articles with Keyword 'legitimate user'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1156 - 1158

Revisiting Defenses against Large-Scale Online Password Guessing Attacks

Ravi Kumar Yalagandala, Dr. N. Chandra Sekhar Reddy

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1940 - 1943

Analysis of Common Access Control Models and Their Limitations in Cloud Computing Environment

Mojtaba Mohamamdi, Keshav Kishore

Share this Article
Top