Friday 18th of August 2017
 

A Study On Unsupervised IDS Techniques


Ujjwal Bhangale, Manthan Agrawal, Avadh Agrawal and Krushna Darade

Intrusion detection systems are gaining more and more territory in the field of secure networks and new ideas and concepts regarding the intrusion detection process keep surfacing. This paper presents an overview of different intrusions in cloud, various detection techniques used by IDS and the types IDS. Then, we study some pertinent existing tools and intrusion detection systems with respect to their various types, applications and data source. With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are increasingly limited by their need of an up-to-date and comprehensive knowledge base. Applying data mining techniques on raw network data, a number of researches have been carried out to develop an unsupervised IDS to fortify systems over the network from the increasing types of attacks.

Keywords: cloud computing; Intrusion detection; signature; anomaly; BRO; SNORT

Download Full-Text


ABOUT THE AUTHORS

Ujjwal Bhangale
Student of IT department Pune Institute Of Computer Technology PUNE, INDIA.

Manthan Agrawal
Student of IT department Pune Institute Of Computer Technology PUNE, INDIA.

Avadh Agrawal
Student of IT department Pune Institute Of Computer Technology PUNE, INDIA.

Krushna Darade
Student of IT department Pune Institute Of Computer Technology PUNE, INDIA.


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »