0% found this document useful (0 votes)
13 views

Abstract

An intrusion detection system monitors network traffic and system activities for signs of intrusions and detects anomalies. Data mining techniques can be applied to network data to detect possible intrusions by selecting appropriate features from the data. Intrusion detection systems constantly run in the background and notify users when suspicious or illegal activity is detected, though proper configuration is needed for users to appreciate the notifications. Potential intruders can come from outside over the internet or from inside an organization, with studies showing most intrusions originate internally.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Abstract

An intrusion detection system monitors network traffic and system activities for signs of intrusions and detects anomalies. Data mining techniques can be applied to network data to detect possible intrusions by selecting appropriate features from the data. Intrusion detection systems constantly run in the background and notify users when suspicious or illegal activity is detected, though proper configuration is needed for users to appreciate the notifications. Potential intruders can come from outside over the internet or from inside an organization, with studies showing most intrusions originate internally.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

INTRUSION DETECTION SYSTEM

ABSTRACT

In highly networked modern world, conventional techniques of network security such as user
authentication, cryptography and intrusion prevention techniques like firewalls are not enough, owing
to formulations of new attacks. Intrusion detection systems are becoming an important need for today’s
networks. Anomaly detection is used as a part of intrusion detection systems, which in turn use certain
data mining techniques. Data mining techniques can be applied to the network data to detect possible
intrusions. The foremost step in application of data mining techniques is the selection of appropriate
features from the data.

An intrusion is someone attempting to break into or misuse the system. An intrusion detection system
(IDS) for short, attempts to detect an intruder breaking into the system or a legitimate user misusing
system resources. The IDS will run constantly on the system, working away in the background, and only
notifying the user when it detects something it considers suspicious or illegal. Whether the user
appreciates that notification depends on how well the users have configured the intrusion detection
system.

Note that there are types of potential intruders:

Outside Intruders: Most people perceive the outside world to be the largest threat to their security. The
media scare over “hacker’ coming in over the Internet has only heightened this perception.

Inside Intruders: FBI studies have revealed that 80% of intrusions and attacks come from within
organizations.

You might also like