logo

MIT141559 IT Security Assignment: Networking Intrusion Detection Systems

   

Added on  2020-05-28

6 Pages1185 Words131 Views
Literature Review on Networking Intrusion Detection Systems
MIT141559 IT Security Assignment: Networking Intrusion Detection Systems_1
Literature Review: Networking Intrusion Detection SystemsTable of Contents1.Network Based Intrusion Detection and Prevention Systems: Attack Classification, Methodologies and Tools......................................................................................................................22.Survey on Host and Network Based Intrusion Detection System..................................................23.NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps.24.Enhancing the Accuracy of Network-based Intrusion Detection with Host-based Context...........35.Host and Network based Anomaly Detectors for HTTP Attacks...................................................36.Network Intrusion Detection.........................................................................................................3References.............................................................................................................................................51
MIT141559 IT Security Assignment: Networking Intrusion Detection Systems_2
Literature Review: Networking Intrusion Detection Systems1.Network Based Intrusion Detection and Prevention Systems: AttackClassification, Methodologies and ToolsThe authors, Harale and Meshram have described the attack classification, methodologies andtools associated with network-based intrusion detection (NIDS) and prevention systems in thejournal. Some of the NIDS include SNORT, Cisco NIDS, Suricata and Bro, and many more.These can work on large networks without any interruptions and are not detectable by themalevolent entities. However, these may have issues in the detection of encrypted orfragmented packets. Open source and commercial are the modern NIDS that have beendeveloped that may be signature-based or anomaly-based and have anti-evasion capabilitiesalong with enhanced stability and reliability compatibility. Security effectiveness is alsooffered by NIDS vendors in the form of policy and alert handling, reporting, securitymanagement and configurations [1]. 2.Survey on Host and Network Based Intrusion Detection SystemTwo of the most popular types of intrusion detection systems are host-based and network-based systems. The authors, Das and Sarkar have provided the comparison and description ofboth of these systems in the journal. NIDS are the active systems that are deployed on small,medium or large networks to track and monitor the network traffic. These are usually OSindependent and do not impact the functionality of other systems unlike host-based IDS.Neural networks and data mining techniques are being widely used and integrated in themodern age NIDS to understand the attack patterns and trends. These systems usuallyidentify the attacks using signature-based identification method and may also includeanomaly-based detection [2].3.NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps Self-Organizing Maps (SOM) and their application in the network-based intrusion detectionsystems has been explored by the authors, Labib and Vemuri in the research paper. SOMhave the ability to classify the real-time data sets in a quicker, accurate and reliable manner.In the network-based intrusion detection systems, the technique may be applied on theEthernet packets by extracting the IP addresses of destination, source and protocol type. Afterthe data collection and pre-processing, data normalization and scaling followed by time2
MIT141559 IT Security Assignment: Networking Intrusion Detection Systems_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Network Intrusion Detection System
|2
|364
|30

Intrusion Detection System PDF
|6
|966
|48

MN692 Capstone Project (pdf)
|20
|4252
|34

THE SECURITY OF NETWORK
|11
|1870
|16

Information Management: Intrusion Detection, Firewalls, and Operating System Security
|4
|778
|289

(Doc) Intrusion Detection System
|10
|2535
|219