Skip to main content

Hybrid Network Intrusion Detection Systems: A Decade’s Perspective

  • Conference paper
  • First Online:
Proceedings of the International Conference on Signal, Networks, Computing, and Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 395))

Abstract

With the increasing deployment of network systems, network attacks are increasing in intensity as well as complexity. Along with these increasing network attacks, many network intrusion detection techniques have been proposed which are broadly classified as being signature-based, classification-based, or anomaly-based. A deployable network intrusion detection system (NIDS) should be capable of detecting of known and unknown attacks in near real time with very low false positive rate. Supervised approaches for intrusion detection provides good detection accuracy for known attacks, but they can not detect unknown attacks. Some of the existing NIDS emphasize on unknown attack detection by using unsupervised anomaly detection techniques, but they can not distinguish network data as accurately as supervised approaches. Moreover they do not consider some other important issues like real time detection or minimization of false alarm. To overcome these problems, in the recent years many hybrid NIDS have been proposed which are basically aimed at detecting both known and unknown attacks with high accuracy of detection. In this literature review on hybrid network intrusion detection systems, we will discuss a few of the notable hybrid NIDS proposed in the recent years and will try to provide a comparative study on them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chih-Fong Tsai, C.Y.L.: A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognition 43 222–229 2010

    Google Scholar 

  2. Wun-Hwa Chen, Sheng-Hsun Hsu, H.P.S.: Application of svm and ann for intrusion detection. Computers and Operations Research 32 2617–2634 2005

    Google Scholar 

  3. Alvaro Herrero, Emilio Corchado, M.A.P.A.A.: Movih-ids: A mobile-visualization hybrid intrusion detection system. Neurocomputing 72 2775–2784 2009

    Google Scholar 

  4. Tansel Ozyer, Reda Alhajj, K.B.: Intrusion detection by integrating boosting genetic fuzzy classier and data mining criteria for rule pre-screening. Journal of Network and Computer Applications 30 99–113 2007

    Google Scholar 

  5. Sandhya Peddabachigari, Ajith Abrahamb, C.G.J.T.: Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications 30 114–132 2007

    Google Scholar 

  6. M Panda, Ajith Abraham, M.R.P.: A hybrid intelligent approach for network intrusion detection. In: Proc. International Conference on Communication Technology and System Design 2011. ICCTSD 1–9 2011

    Google Scholar 

  7. Baojun Zhang, Xuezeng Pan, J.W.: Hybrid intrusion detection system for complicated network. In: Proc. of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery. FSKD 2007

    Google Scholar 

  8. J. Gomez, C. Gil, N.P.R.B.C.J.: Design of a snort-based hybrid intrusion detection system. In: Proc.of the IWANN 2009. 515–522 2009

    Google Scholar 

  9. Jawhar, M., Mehrotra, M.: Design network intrusion detection system using hybrid fuzzy-neural network. International Journal of Computer Science and Security 4 285 2010

    Google Scholar 

  10. Aydın, M., Zaim, A., Ceylan, K.: A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering 35 (2009) 517–526 2009

    Google Scholar 

  11. Hwang, K., Cai, M., Chen, Y., Qin, M.: Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Transactions on Dependable and Secure Computing, 4 (2007) 41–55

    Google Scholar 

  12. Yuk Ying Chung and Noorhaniza Wahid. A hybrid network intrusion detection system using simplified swarm optimization (sso). Applied Soft Computing, 12(9):3014–3022, 2012.

    Google Scholar 

  13. Reda M Elbasiony, Elsayed A Sallam, Tarek E Eltobely, and Mahmoud M Fahmy. A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Engineering Journal, 4(4):753–762, 2013.

    Google Scholar 

  14. Gisung Kim, Seungmin Lee, and Sehun Kim. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4):1690–1700, 2014.

    Google Scholar 

  15. Bin Luo and Jingbo Xia. A novel intrusion detection system based on feature generation with visualization strategy. Expert Systems with Applications, 41(9):4139–4147, 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asish Kumar Dalai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer India

About this paper

Cite this paper

Dalai, A.K., Jena, S.K. (2017). Hybrid Network Intrusion Detection Systems: A Decade’s Perspective. In: Lobiyal, D., Mohapatra, D., Nagar, A., Sahoo, M. (eds) Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering, vol 395. Springer, New Delhi. https://doi.org/10.1007/978-81-322-3592-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-3592-7_35

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-3590-3

  • Online ISBN: 978-81-322-3592-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics