Preview

Anomaly Based Intrusion Detection System

Powerful Essays
Open Document
Open Document
8698 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Anomaly Based Intrusion Detection System
computers & security 28 (2009) 18–28

available at www.sciencedirect.com

journal homepage: www.elsevier.com/locate/cose

Anomaly-based network intrusion detection:
Techniques, systems and challenges
P. Garcı´a-Teodoroa,*, J. Dı´az-Verdejoa, G. Macia´-Ferna´ndeza, E. Va´zquezb a Department of Signal Theory, Telematics and Communications – Computer Science and Telecommunications Faculty,
University of Granada, Granada, Spain b Department of Telematic Engineering - Universidad Polite´cnica de Madrid, Madrid, Spain

article info

abstract

Article history:

The Internet and computer networks are exposed to an increasing number of security

Received 9 January 2008

threats. With new types of attacks appearing continually, developing flexible and adaptive

Accepted 13 August 2008

security oriented approaches is a severe challenge. In this context, anomaly-based network intrusion detection techniques are a valuable technology to protect target systems and

Keywords:

networks against malicious activities. However, despite the variety of such methods

Network security

described in the literature in recent years, security tools incorporating anomaly detection

Threat

functionalities are just starting to appear, and several important problems remain to be

Intrusion detection

solved. This paper begins with a review of the most well-known anomaly-based intrusion

Anomaly detection

detection techniques. Then, available platforms, systems under development and research

IDS systems and platforms

projects in the area are presented. Finally, we outline the main challenges to be dealt with

Assessment

for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues.
ª 2008 Elsevier Ltd. All rights reserved.

1.

Introduction

Intrusion Detection Systems (IDS) are security tools that, like other measures such as antivirus software, firewalls and access control schemes, are intended to strengthen the security of information and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Project Charter Template

    • 279 Words
    • 2 Pages

    Why should we do this project? What will be gained, changed, or modified? Is there a financial or business reason to do this project? This area should contain any feasibility studies, NPV, PI, PB, or PBD used to advance the project.…

    • 279 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Good Essays

    These papers are to reflect the current "state of the art" in the area and should reflect both academic and professional (practical) orientations. The paper should review the available research, discuss the implications of that research for the topic area, and provide conclusions. The paper should be organized into the following areas:…

    • 652 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Scholarly Practice Project

    • 1931 Words
    • 8 Pages

    The following includes a list of general topics and the grouping of projects by category.…

    • 1931 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Power to the Edge

    • 65341 Words
    • 262 Pages

    This report documents the fourth in a series of workshops and roundtables organized by the INSS Center for Advanced Concepts and Technology (ACT)…

    • 65341 Words
    • 262 Pages
    Powerful Essays
  • Better Essays

    android

    • 1051 Words
    • 5 Pages

    discussed in this paper and like other every technology have pros and cons which will discussed…

    • 1051 Words
    • 5 Pages
    Better Essays
  • Better Essays

    An intrusion prevention system sit in-line on the network and monitors the traffic, and when a suspicious event occurs it takes action based on certain prescribed rules. An IPS is an active and real time device, unlike an Intrusion detection system which is not inline and they are passive devices. Intrusion prevention systems are considered to be the evolution of intrusion detection system.…

    • 754 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Ecco Case

    • 5419 Words
    • 22 Pages

    This project is based on the assumption that all material used and present our strategy should cover the most essential aspects of the chosen subject. We, therefore, intended to include as broad a material selection as possible.…

    • 5419 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    who carried out the summer project proposal work under my supervision. This report is forwarded for examination.…

    • 4907 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    of interest from the private sector for investment in this project. This report provides a basis…

    • 2878 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    In this report will presented some noticeable points to the history, different types, the benefits and limitations, competitive advantages, and costs and ownership of emerging technologies.…

    • 1162 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    intrusion detection system

    • 2058 Words
    • 9 Pages

    8/5/2010 Paul Apolinar Christian Chavez RJ Favila Arni Paragas Jessica Mayuga Abegail Soñas  Defined by ICSA as:  The detection of intrusions or intrusions attempts either manually or via software expert systems that operate on logs or other information available from the system or the network. IT Security     …

    • 2058 Words
    • 9 Pages
    Good Essays
  • Good Essays

    This project was possible as a result of much research carried out by the active participation and contribution by every member of the group.…

    • 2825 Words
    • 12 Pages
    Good Essays