Intrusion Detection Systems, Issues, Challenges, and Needs

نویسندگان

چکیده

Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), support vector machine (SVM) have been used IDS in last decades. However, these classifiers is not working well if they applied alone without any other algorithms that can tune parameters or choose best sub set features problem. Such C SVM gamma which effect performance tuned well. Optimization genetic algorithm (GA), particle swarm optimization (PSO) , ant colony algorithm, along with to improve work detecting intrusion increase classifiers. suffer from lacks especially when apply detect new type attacks, need JAYA teaching learning-based (TLBO) arise. In this paper, we review IDS, state their strength weaknesses, provide researchers alternative could be use field future works.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Intrusion detection Systems: Issues and Challenges

In Distributed Intrusion Detection Systems (DIDS) data is collected from various sources, correlated, and used to determine if systems are under attack or have been compromised. The use of DIDS allows for increased security as there is a broader view of incidents transpiring across the entire network. With data coming from different sources, the problem of correlating and analyzing such large a...

متن کامل

Intrusion Detection Systems: Definition, Need and Challenges

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

متن کامل

Intrusion Detection Systems: Definition, Need and Challenges

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

متن کامل

Intrusion Detection Systems: Definition, Need and Challenges

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

متن کامل

Intrusion Detection Systems: Definition, Need and Challenges

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computational Intelligence Systems

سال: 2021

ISSN: ['1875-6883', '1875-6891']

DOI: https://doi.org/10.2991/ijcis.d.210105.001