Preview

Anomaly Based Intrusion Detection System

Powerful Essays
Open Document
Open Document
8698 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Anomaly Based Intrusion Detection System
computers & security 28 (2009) 18–28

available at www.sciencedirect.com

journal homepage: www.elsevier.com/locate/cose

Anomaly-based network intrusion detection:
Techniques, systems and challenges
P. Garcı´a-Teodoroa,*, J. Dı´az-Verdejoa, G. Macia´-Ferna´ndeza, E. Va´zquezb a Department of Signal Theory, Telematics and Communications – Computer Science and Telecommunications Faculty,
University of Granada, Granada, Spain b Department of Telematic Engineering - Universidad Polite´cnica de Madrid, Madrid, Spain

article info

abstract

Article history:

The Internet and computer networks are exposed to an increasing number of security

Received 9 January 2008

threats. With new types of attacks appearing continually, developing flexible and adaptive

Accepted 13 August 2008

security oriented approaches is a severe challenge. In this context, anomaly-based network intrusion detection techniques are a valuable technology to protect target systems and

Keywords:

networks against malicious activities. However, despite the variety of such methods

Network security

described in the literature in recent years, security tools incorporating anomaly detection

Threat

functionalities are just starting to appear, and several important problems remain to be

Intrusion detection

solved. This paper begins with a review of the most well-known anomaly-based intrusion

Anomaly detection

detection techniques. Then, available platforms, systems under development and research

IDS systems and platforms

projects in the area are presented. Finally, we outline the main challenges to be dealt with

Assessment

for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues.
ª 2008 Elsevier Ltd. All rights reserved.

1.

Introduction

Intrusion Detection Systems (IDS) are security tools that, like other measures such as antivirus software, firewalls and access control schemes, are intended to strengthen the security of information and

You May Also Find These Documents Helpful

  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Jim Brown

    • 770 Words
    • 4 Pages

    Thank you for the opportunity to offer our services to you. We hope that we can provide you with a satisfactory experience based on our previous years of collected knowledge. In this document we have included a report that summarizes the key points in this project.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Good Essays

    These papers are to reflect the current "state of the art" in the area and should reflect both academic and professional (practical) orientations. The paper should review the available research, discuss the implications of that research for the topic area, and provide conclusions. The paper should be organized into the following areas:…

    • 652 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Pros And Cons Of Tanks

    • 336 Words
    • 2 Pages

    In 1915 Europe was in the midst of World War I and was at a stalemate caused by trench warfare. There was a need for new and revolutionary weapons to end the dilemma. The British found a solution to this problem by inventing tanks. The invention of the tank had numerous pros and cons, but it ultimately changed warfare.…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Scholarly Practice Project

    • 1931 Words
    • 8 Pages

    The following includes a list of general topics and the grouping of projects by category.…

    • 1931 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Abortion is the process by which an embryo or fetus is removed from the uterus, resulting in the termination of a pregnancy. Natural or non induced abortions are commonly known as miscarriages. Abortion has had a long and passionate history. It has been induced through various methods ranging from, herbal medicines, and the use of sharpened tools, physical trauma, and other traditional methods. The different legal and cultural views on abortion differ around the world, and in many regions of the world public debate over the ethics and legal ramifications of abortion are intense.…

    • 1602 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Power to the Edge

    • 65341 Words
    • 262 Pages

    This report documents the fourth in a series of workshops and roundtables organized by the INSS Center for Advanced Concepts and Technology (ACT)…

    • 65341 Words
    • 262 Pages
    Powerful Essays
  • Better Essays

    An intrusion prevention system sit in-line on the network and monitors the traffic, and when a suspicious event occurs it takes action based on certain prescribed rules. An IPS is an active and real time device, unlike an Intrusion detection system which is not inline and they are passive devices. Intrusion prevention systems are considered to be the evolution of intrusion detection system.…

    • 754 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Ecco Case

    • 5419 Words
    • 22 Pages

    This project is based on the assumption that all material used and present our strategy should cover the most essential aspects of the chosen subject. We, therefore, intended to include as broad a material selection as possible.…

    • 5419 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    who carried out the summer project proposal work under my supervision. This report is forwarded for examination.…

    • 4907 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    of interest from the private sector for investment in this project. This report provides a basis…

    • 2878 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    This project was possible as a result of much research carried out by the active participation and contribution by every member of the group.…

    • 2825 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    In this report will presented some noticeable points to the history, different types, the benefits and limitations, competitive advantages, and costs and ownership of emerging technologies.…

    • 1162 Words
    • 5 Pages
    Powerful Essays