Skip to main content

Intrusion Detection Systems

  • Chapter
  • First Online:
Network Intrusion Detection using Deep Learning

Abstract

This chapter briefly introduces all the relevant definitions on Intrusion Detection System (IDS), followed by a classification of current IDSs, based on the detection module located and the approach adopted. We also explain and provide examples of one common IDS in research fields, which is machine-learning-based IDS. Then, we discuss an example of IDS using bio-inspired clustering method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (idps),” NIST special publication, vol. 800, no. 2007, 2007.

    Google Scholar 

  2. A. H. Farooqi and F. A. Khan, “Intrusion detection systems for wireless sensor networks: A survey,” in Proc. Future Generation Information Technology Conference, Jeju Island, Korea. Springer, 2009, pp. 234–241.

    Google Scholar 

  3. R. Mitchell and I. R. Chen, “Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems,” IEEE Trans. Dependable Secure Comput., vol. 12, no. 1, pp. 16–30, Jan 2015.

    Article  Google Scholar 

  4. I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 266–282, 2014.

    Article  Google Scholar 

  5. O. Y. Al-Jarrah, O. Alhussein, P. D. Yoo, S. Muhaidat, K. Taha, and K. Kim, “Data randomization and cluster-based partitioning for botnet intrusion detection,” IEEE Trans. Cybern., vol. 46, no. 8, pp. 1796–1806, 2015.

    Article  Google Scholar 

  6. M. Sokolova, N. Japkowicz, and S. Szpakowicz, “Beyond accuracy, F-score and ROC: a family of discriminant measures for performance evaluation,” in Australasian Joint Conference on Artificial Intelligence, Hobart, Australia. Springer, 2006, pp. 1015–1021.

    Google Scholar 

  7. P. D. Schloss and S. L. Westcott, “Assessing and improving methods used in operational taxonomic unit-based approaches for 16s rRNA gene sequence analysis,” Applied and environmental microbiology, vol. 77, no. 10, pp. 3219–3226, 2011.

    Article  Google Scholar 

  8. M. Tavallaee, E. Bagheri, W. Lu, and A.-A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009, pp. 53–58, 2009.

    Google Scholar 

  9. H. M. Shirazi, “An intelligent intrusion detection system using genetic algorithms and features selection,” Majlesi Journal of Electrical Engineering, vol. 4, no. 1, 2010.

    Google Scholar 

  10. S. Potluri and C. Diedrich, “Accelerated deep neural networks for enhanced intrusion detection system,” in Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference on. IEEE, 2016, pp. 1–8.

    Google Scholar 

  11. C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, “Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 184–208, 2015.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd., part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kim, K., Aminanto, M.E., Tanuwidjaja, H.C. (2018). Intrusion Detection Systems. In: Network Intrusion Detection using Deep Learning. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-1444-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1444-5_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1443-8

  • Online ISBN: 978-981-13-1444-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics