Intrusion Detection Systems, Issues, Challenges, and Needs
نویسندگان
چکیده
Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), support vector machine (SVM) have been used IDS in last decades. However, these classifiers is not working well if they applied alone without any other algorithms that can tune parameters or choose best sub set features problem. Such C SVM gamma which effect performance tuned well. Optimization genetic algorithm (GA), particle swarm optimization (PSO) , ant colony algorithm, along with to improve work detecting intrusion increase classifiers. suffer from lacks especially when apply detect new type attacks, need JAYA teaching learning-based (TLBO) arise. In this paper, we review IDS, state their strength weaknesses, provide researchers alternative could be use field future works.
منابع مشابه
Distributed Intrusion detection Systems: Issues and Challenges
In Distributed Intrusion Detection Systems (DIDS) data is collected from various sources, correlated, and used to determine if systems are under attack or have been compromised. The use of DIDS allows for increased security as there is a broader view of incidents transpiring across the entire network. With data coming from different sources, the problem of correlating and analyzing such large a...
متن کاملIntrusion Detection Systems: Definition, Need and Challenges
IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...
متن کاملIntrusion Detection Systems: Definition, Need and Challenges
IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...
متن کاملIntrusion Detection Systems: Definition, Need and Challenges
IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...
متن کاملIntrusion Detection Systems: Definition, Need and Challenges
IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computational Intelligence Systems
سال: 2021
ISSN: ['1875-6883', '1875-6891']
DOI: https://doi.org/10.2991/ijcis.d.210105.001