An Analytical Survey on Intrusion Detection System and Their Identification Methodologies

  • Ananthi Sheshasaayee
  • Priyanka Muniyandi
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


A computer network is bound to have several issues with the increase in the advancement in the technological world today. It is vulnerable against several attacks and threats from hackers which could probably devour the whole network set up. This prompted the need for the researchers to build an application system that would possibly secure and safeguard the network environment. An Intrusion Detection System (IDS) is one such entity that is developed with the competence to reveal the attacks in network systems. In this paper a detailed approach to vulnerabilities in a network system and the importance of IDS and a analytical study of the IDS techniques and principles is discussed.


Intrusion detection system Firewall Network intrusion detection Host-based intrusion detection Anomaly detection Signature detection 


  1. 1.
    Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: A comprehensive review. J. Network Comput. Appl. 36(1), 16–24 (2013)CrossRefGoogle Scholar
  2. 2.
    Axelsson, S.: Research in intrusion-detection systems: A survey, vol. 120. Technical report 98–17. Department of Computer Engineering, Chalmers University of Technology (1998)Google Scholar
  3. 3.
  4. 4.
    Vijayarani, S., Maria Sylviaa, S.: Intrusion detection system – a study. Int. J. Secur. Priv. Trust Manag. (IJSPTM) 4(1), 31–44 (2015)CrossRefGoogle Scholar
  5. 5.
    Sabahi, F., Movaghar, A.: Intrusion detection: a survey. In: 3rd International Conference on Systems and Networks Communications. ICSNC 2008, pp. 23–26. IEEE, October 2008Google Scholar
  6. 6.
  7. 7.
    Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 275–283, August 2000Google Scholar
  8. 8.
    “Intrusion Detection and Intrusion Prevention”-Ed Sale VP of Security Pivot Group, LLCGoogle Scholar
  9. 9.
    Intrusion detection system buyer’s guideGoogle Scholar
  10. 10.
  11. 11.
  12. 12.
  13. 13.
  14. 14.
  15. 15.
    Intrusion detection system buyer’s guideGoogle Scholar
  16. 16.
  17. 17.
    Denning, D.E.: An intrusion-detection model. IEEE Trans. Software Eng. 2, 222–232 (1987)CrossRefGoogle Scholar
  18. 18.
    Ghafir, I., Prenosil, V., Svoboda, J., Hammoudeh, M.: A survey on network security monitoring systems. In: IEEE International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 77–82. IEEE, August 2016Google Scholar
  19. 19.
    Zhang, J., Tang, J., Zhang, X., Ouyang, W., Wang, D.: A survey of network traffic generation, p. 6 (2015)Google Scholar
  20. 20.
    Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266–282 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Research Department of Computer ScienceQuaid -E-Millath Government College for WomenChennaiIndia

Personalised recommendations