Ross Heenan
A survey of Intrusion Detection System technologies
Heenan, Ross; Moradpoor, Naghmeh
Abstract
This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.
Citation
Heenan, R., & Moradpoor, N. (2016, May). A survey of Intrusion Detection System technologies. Presented at Post Graduate Cyber Security (PGCS) symposium, Edinburgh
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | Post Graduate Cyber Security (PGCS) symposium |
Start Date | May 10, 2016 |
End Date | May 10, 2016 |
Acceptance Date | Apr 10, 2016 |
Publication Date | Jun 10, 2016 |
Deposit Date | Feb 8, 2017 |
Publicly Available Date | Feb 9, 2017 |
Book Title | PGCS 2016: The First Post Graduate Cyber Security Symposium – The Cyber Academy |
Keywords | Intrusion Detection Systems (IDS), Host-; based IDS (HIDS), Network-based IDS (NIDS),; Machine Learning, Artificial Neural Network, Genetic; Algorithm |
Public URL | http://researchrepository.napier.ac.uk/Output/461946 |
Related Public URLs | http://thecyberacademy.org/wp-content/uploads/2016/05/PGCS-symposium_2016_paper_1.pdf |
Contract Date | Feb 8, 2017 |
Files
A survey of intrusion detection system technologies
(418 Kb)
PDF
Copyright Statement
Copyright (c) PGCS, 2016.25/27
You might also like
Machine Learning for Smart Healthcare Management Using IoT
(2024)
Book Chapter
A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks
(2023)
Journal Article
Building Towards Automated Cyberbullying Detection: A Comparative Analysis
(2022)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search