International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


A Survey on Various Techniques for Classifying Attacks in NIDS

Ruchira Gurav | Aparna Junnarkar


Abstract: Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion. IDSs are based on the belief that an intruders behavior will be noticeably different from that of a legitimate user. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious attacks by using traditional statistical methods to new data mining approaches in last decades. The conventional system is not efficient for unseen data and they need to be updated frequently to work properly. There are several techniques which classify data into only normal and threat or attack type, further classification is not done which leads to less accuracy. In several approaches dimensionality of input set is large which makes the problem complex and redundancy might increase. So basically in todays world of internet and automation, it is important to maintain a security, authenticity. There must be a proper efficient technique which can detect attacks and classify them into proper attack categories. The further classification into sub-attack categories plays a vital role in IDS as likewise preventive actions can be taken. So basically in this paper we are going to focus on various techniques for classifying attacks in NIDS.


Keywords: Intrusion Detection System, Promiscuous mode, dimensionality, alerts, legitimate user


Edition: Volume 3 Issue 11, November 2014,


Pages: 2195 - 2197


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ruchira Gurav, Aparna Junnarkar, "A Survey on Various Techniques for Classifying Attacks in NIDS ", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2195-2197, https://www.ijsr.net/get_abstract.php?paper_id=OCT141511

Similar Articles with Keyword 'Intrusion Detection System'

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [18]

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 4, April 2024

Pages: 285 - 288

Anomaly Detection of Financial Data using Machine Learning

Khirod Chandra Panda [3]

Share this Article
Top