International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.6, No.8, Jul. 2014

A New Classification Scheme for Intrusion Detection Systems

Full Text (PDF, 586KB), PP.56-70

Views:138   Downloads:4


Bilal Maqbool Beigh

Index Terms

Network;Intrusion Detection;techniques;Security;attacks;hackers;classification


In today’s world, overall global mostly depend on technologies for their information storage and transactions. But this frequent use of online technologies make the data stored exposed to the risk of attacks towards the data in the form of intrusion. In order to save our data from these attacks, the researchers had implemented a concept called intrusion detection system, with the help of detection technology the users can prevent their critical data from different kind of attacks. As we know that there are lots of intrusion detection system in market which are either open source and some of them are commercial. Although the number is very high but there is no such classification available in research literature which will help user or security professionals. In this paper we will present a good and elaborated classification based on various parameters which will help the researchers and security professional to understand the category. The paper will also provide a brief detail of those categories which will give idea of representing the intrusion detection techniques.

Cite This Paper

Bilal Maqbool Beigh,"A New Classification Scheme for Intrusion Detection Systems", IJCNIS, vol.6, no.8, pp.56-70, 2014. DOI: 10.5815/ijcnis.2014.08.08


[1]Beigh, Bilal Maqbool, and M. A. Peer. "Intrusion Detection and Prevention System: Classification and Quick." (2011).

[2]Easttom, William Chuck. Computer security fundamentals. Pearson Education India, 2012. 

[3]Bhat, Wasim Ahmad, and S. M. K. Quadri. "Design Considerations for Developing a Disk File System." PhD diss., 2012.

[4]Wang, Defeng, Daniel S. Yeung, and E. C. Tsang. "Weighted mahalanobis distance kernels for support vector machines." Neural Networks, IEEE Transactions on 18.5 (2007): 1453-1462.

[5]Jaiganesh, V., Mangayarkarasi, S., & Sumathi, P.(2013). Intrusion Detection Systems: A Survey and Analysis of Classification Techniques. International Journal of Advanced Research in Computer and communication Engineering ,Vol. 2, Issue 4, April 2013 

[6]Asmaa Shaker ashoor and Sharad Gore, "Intrusion Detection System (IDS): Case Study," in IACSIT Press, Singapore, 2011, pp. 6-9. 

[7]Anderson, J. P. Computer Security Threat Monitoring and Surveillance, James P. Anderson Co., Box 42, Fort Washington. PA 19034 Technical Report Contract 79F296400, 1980. 

[8]Denning, Dorothy E. "An intrusion-detection model." Software Engineering, IEEE Transactions on 2 (1987): 222-232

[9]Desai, M. D. Distributed intrusion detection (Doctoral dissertation, Indian Institute of Technology, Bombay). 2002.

[10]Lippmann, Richard, Joshua W. Haines, David J. Fried, Jonathan Korba, and Kumar Das. "The 1999 DARPA off-line intrusion detection evaluation." Computer networks 34, no. 4 (2000): 579-595.

[11]Bace, Rebecca. “Technology Series Intrusion Detection”, Macmillan Technical Publishing, 2000

[12]Kozushko, Harley. "Intrusion detection: host-based and network-based intrusion detection systems." on September 11 (2003).

[13]Kemmerer, Richard A., and Giovanni Vigna. "Intrusion detection: a brief history and overview." Computer 35, no. 4 (2002): 27-30.

[14]Zhang, Yongguang, Wenke Lee, and Yi-An Huang. "Intrusion detection techniques for mobile wireless networks." Wireless Networks 9.5 (2003): 545-556.

[15]Caswell, Brian, Jay Beale, and Andrew Baker. Snort Intrusion Detection and Prevention Toolkit. Syngress, 2007.

[16]Amer, Suhair H., and Jr John A. Hamilton. "Input Data Processing Techniques in Intrusion Detection Systems? Short Review." Global Journal of Computer Science and Technology 9, no. 5 (2010).

[17]Castro, Jaime Daniel Mejía, Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, and Luis Javier García Villalba. "TAXONOMY OF NETWORK INTRUSION DETECTION SYSTEM BASED ON ANOMALIES." (2013).

[18]Ning, Peng, and Sushil Jajodia. "Intrusion‐Detection Systems." Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, Volume 3: 403-420

[19]Roesch, Martin. "Snort: Lightweight Intrusion Detection for Networks." In LISA, vol. 99, pp. 229-238. 1999

[20]Bloedorn, Eric, Alan D. Christiansen, William Hill, Clement Skorupka, Lisa M. Talbot, and Jonathan Tivel. Data mining for network intrusion detection: How to get started. MITRE Technical Report, 2001. 

[21]Rajasegarar, Sutharshan, Christopher Leckie, and Marimuthu Palaniswami. "Anomaly detection in wireless sensor networks." Wireless Communications, IEEE 15, no. 4 (2008): 34-40.

[22]Powers, Simon T., and Jun He. "A hybrid artificial immune system and Self Organising Map for network intrusion detection." Information Sciences 178, no. 15 (2008): 3024-3042.

[23]Twycross, Jamie, and Uwe Aickelin. "Towards a conceptual framework for innate immunity." Artificial Immune Systems. Springer Berlin Heidelberg, 2005. 112-125.

[24]Pagnoni, Anastasia, and Andrea Visconti. "An innate immune system for the protection of computer networks." In Proceedings of the 4th international symposium on Information and communication technologies, pp. 63-68. Trinity College Dublin, 2005.

[25]Timmis, Jon, Mark Neal, and John Hunt. "An artificial immune system for data analysis." Biosystems 55, no. 1 (2000): 143-150.

[26]DeCastro, L., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002).

[27]Aickelin, Uwe, Peter Bentley, Steve Cayzer, Jungwon Kim, and Julie McLeod. "Danger theory: The link between AIS and IDS?." In Artificial Immune Systems, pp. 147-155. Springer Berlin Heidelberg, 2003

[28]Grossman, R. L. "Data mining: challenges and opportunities for data mining during the next decade." Disponível: Magnify site. URL: http://www. magnify. com, Consultado em dez (1997).

[29]Gaikwad, D., Sonali Jagtap, Kunal Thakare, and Vaishali Budhawant. "Anomaly Based Intrusion Detection System Using Artificial Neural Network and Fuzzy Clustering." International Journal of Engineering 1, no. 9 (2012).

[30]Ben Gal, I., "Bayesian Networks" in Encyclopedia of Statistics in Quality and Reliability, Ruggeri, F., Kenett, R. S. and Faltin, F. (editors in chief), Wiley, 2007.

[31]Pearl J. Pearl, “Reverend bayes on inference engines: a distributed hierarchical approach,” in Proc. of the National Conference on Artificial Intelligence, 1982, pp. 133–136..

[32]Scott, Steven L. "A Bayesian paradigm for designing intrusion detection systems." Computational statistics & data analysis 45, no. 1 (2004): 69-83. 

[33]Zadeh, Lotfi A. "Is there a need for fuzzy logic?." Information Sciences 178, no. 13 (2008): 2751-2779.

[34]Dhanalakshmi, Y., and I. Ramesh Babu. "Intrusion detection using data mining along fuzzy logic and genetic algorithms." International Journal of Computer Science and Network Security 8, no. 2 (2008): 27-32Moradi and Zulkerniene, 1980 outlier detection

[35]Hawkins, Douglas M. Identification of outliers. Vol. 11. London: Chapman and Hall, 1980..

[36]Suzuki, Kenji, ed. Artificial neural networks-methodological advances and biomedical applications. InTech, 2011.

[37]Zhang, Yuwen, X. Ding, Y. Liu, and P. J. Griffin. "An artificial neural network approach to transformer fault diagnosis." Power Delivery, IEEE Transactions on 11, no. 4 (1996): 1836-1841.

[38]Kohonen, Teuvo. "The self-organizing map." Proceedings of the IEEE 78, no. 9 (1990): 1464-1480.

[39]Carpenter, Gail A., and Stephen Grossberg. Adaptive resonance theory. Springer US, 2010.

[40]Axelsson, Stefan. Intrusion detection systems: A survey and taxonomy. Vol. 99. Technical report, 2000.

[41]Gross, George. "Stochastic processes." (1996).

[42]Qayyum, A., M. H. Islam, and M. Jamil. "Taxonomy of statistical based anomaly detection techniques for intrusion detection." In Emerging Technologies, 2005. Proceedings of the IEEE Symposium on, pp. 270-276. IEEE, 2005.



[45]H. Debar, M. Becker and D. Siboni, ”A neural network component for an intrusion detection system,” Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 240-250, Oakland, CA, May 1992.

[46]Luger, George, Arthur Maccabe, and Mark Servilla. The architecture of a network-level intrusion detection system. Department of Computer Science, College of Engineering, University of New Mexico, 1990.

[47]Greensmith, Julie, Uwe Aickelin, and Steve Cayzer. "Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection." In Artificial Immune Systems, pp. 153-167. Springer Berlin Heidelberg, 2005.

[48]Patcha, Animesh, and Jung-Min Park. "An overview of anomaly detection techniques: Existing solutions and latest technological trends." Computer Networks 51, no. 12 (2007): 3448-3470.

[49]Portnoy, Leonid, Eleazar Eskin, and Sal Stolfo. "Intrusion detection with unlabeled data using clustering." In In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001. 2001

[50]Farhan, A. F., D. Zulkhairi, and M. T. Hatim. "Mobile agent intrusion detection system for mobile ad hoc networks: A non-overlapping zone approach." In Internet, 2008. ICI 2008. 4th IEEE/IFIP International Conference on, pp. 1-5. IEEE, 2008

[51]Rafsanjani, Marjan Kuchaki, and Ali Movaghar. "Developing a Hybrid Method for Identifying Monitoring Nodes in Intrusion Detection Systems of MANET." Contemporary Engineering Sciences Journal 2, no. 3 (2009): 105-116.

[52]T. Anantvalee and J. Wu, “A survey on intrusion detection in mobile adhoc networks”, Springer J. Wireless Network Security, pages 159-180, 2007.

[53]Samad, Kashan, Ejaz Ahmed, and Waqar Mahmood. "Simplified clustering scheme for intrusion detection in mobile ad hoc networks." In 13th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia. 2005.

[54]Fu, Yingfang, Jingsha He, and Guorui Li. "A distributed intrusion detection scheme for mobile ad hoc networks." In Computer Software and Applications Conference, 2007. COMPSAC 2007.

[55]Huang, Yi-an, and Wenke Lee. "A cooperative intrusion detection system for ad hoc networks." In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 135-147. ACM, 2003

[56]Jansen, Wayne A. "Intrusion detection with mobile agents." Computer Communications 25, no. 15 (2002): 1392-1401.

[57]Toth, Thomas. "Applying mobile agent technology to intrusion detection." (2001).

[58]Mell, Peter, Donald Marks, and Mark McLarnon. "A denial-of-service resistant intrusion detection architecture." Computer Networks 34, no. 4 (2000): 641-658.

[59]Helmer, Guy, Johnny SK Wong, Vasant Honavar, Les Miller, and Yanxin Wang. "Lightweight agents for intrusion detection." Journal of Systems and Software 67, no. 2 (2003): 109-122.

[60]Porras, Phillip A., and Richard A. Kemmerer. "Penetration state transition analysis: A rule-based intrusion detection approach." In Computer Security Applications Conference, 1992. Proceedings., Eighth Annual, pp. 220-229. IEEE, 1992.

[61]Ilgun, Koral. "USTAT: A real-time intrusion detection system for UNIX." In Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on, pp. 16-28. IEEE, 1993.

[62]De Boer, Pieter, and Martin Pels. "Host-based intrusion detection systems." Amsterdam University (2005).

[63]Vokorokos, L., and A. Balaz. "Host-based intrusion detection system." In Intelligent Engineering Systems (INES), 2010 14th International Conference on, pp. 43-47. IEEE, 2010.

[64]Bilal Maqbool Beigh, Uzair Bashir and Manzoor Chahcoo.”Intrusion Detection and Prevention System: Issues and Challenges” International Journal of Computer Applications Published by Foundation of Computer Science, New York, USA 76(17) 2013:26-30

[65]HAN, Dong-Hun. "NETWORK BASED INTRUSION DETECTION SYSTEM." WIPO Patent 2002096028, issued November 29, 2002.

[66]Xiao-Pei, Jing, and Wang Hou-Xiang. "A new Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism." International Journal of Computer Network and Information Security (IJCNIS) 2.2 (2010): 33.

[67]Singh, Preet Inder. "Robust Security System for Critical Computers." International Journal of Information Technology and Computer Science (IJITCS) 4.6 (2012): 24.

[68]Govindarajan, M. "Hybrid Intrusion Detection Using Ensemble of Classification Methods." International Journal of Computer Network & Information Security 6.2 (2014).