Abstract
The basic principle of intrusion detection is based on the assumption that intrusive activities are noticeably different from normal ones and thus are detectable 16. Many intrusion detection approaches have been suggested in the literature since Andersons seminal report 5. Traditionally these approaches are classified into three categories: misuse detection, anomaly detection and specification-based detection. Anomaly based intrusion detection approaches are dedicated to establishing a model of the data flow that is monitored under normal conditions without the presence of any intrusive procedures. In contrast, misuse detection approaches aim to encode knowledge about patterns in the data flow that are known to correspond to intrusive procedures in form of specific signatures. In specification based detection approaches, security experts predefine the allowed system behaviors and thus events that do not match the specifications are labeled as attacks. In this chapter we discuss these different approaches in detail and summarize some representative examples in each category.
Cite
CITATION STYLE
Shankar, A., & Shankar, A. (2021). Network Intrusion Detection and Prevention. International Journal of Applied Engineering Research, 16(4), 267. https://doi.org/10.37622/ijaar/16.4.2021.267-270
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.