Abstract
This chapter briefly introduces all the relevant definitions on Intrusion Detection System (IDS), followed by a classification of current IDSs, based on the detection module located and the approach adopted. We also explain and provide examples of one common IDS in research fields, which is machine-learning-based IDS. Then, we discuss an example of IDS using bio-inspired clustering method.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (idps),” NIST special publication, vol. 800, no. 2007, 2007.
A. H. Farooqi and F. A. Khan, “Intrusion detection systems for wireless sensor networks: A survey,” in Proc. Future Generation Information Technology Conference, Jeju Island, Korea. Springer, 2009, pp. 234–241.
R. Mitchell and I. R. Chen, “Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems,” IEEE Trans. Dependable Secure Comput., vol. 12, no. 1, pp. 16–30, Jan 2015.
I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 266–282, 2014.
O. Y. Al-Jarrah, O. Alhussein, P. D. Yoo, S. Muhaidat, K. Taha, and K. Kim, “Data randomization and cluster-based partitioning for botnet intrusion detection,” IEEE Trans. Cybern., vol. 46, no. 8, pp. 1796–1806, 2015.
M. Sokolova, N. Japkowicz, and S. Szpakowicz, “Beyond accuracy, F-score and ROC: a family of discriminant measures for performance evaluation,” in Australasian Joint Conference on Artificial Intelligence, Hobart, Australia. Springer, 2006, pp. 1015–1021.
P. D. Schloss and S. L. Westcott, “Assessing and improving methods used in operational taxonomic unit-based approaches for 16s rRNA gene sequence analysis,” Applied and environmental microbiology, vol. 77, no. 10, pp. 3219–3226, 2011.
M. Tavallaee, E. Bagheri, W. Lu, and A.-A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009, pp. 53–58, 2009.
H. M. Shirazi, “An intelligent intrusion detection system using genetic algorithms and features selection,” Majlesi Journal of Electrical Engineering, vol. 4, no. 1, 2010.
S. Potluri and C. Diedrich, “Accelerated deep neural networks for enhanced intrusion detection system,” in Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference on. IEEE, 2016, pp. 1–8.
C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, “Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 184–208, 2015.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd., part of Springer Nature
About this chapter
Cite this chapter
Kim, K., Aminanto, M.E., Tanuwidjaja, H.C. (2018). Intrusion Detection Systems. In: Network Intrusion Detection using Deep Learning. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-1444-5_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-1444-5_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1443-8
Online ISBN: 978-981-13-1444-5
eBook Packages: Computer ScienceComputer Science (R0)