A Review on Soft Computing Technique in Intrusion Detection System

Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (I...

Full description

Saved in:
Bibliographic Details
Main Authors: Sulaiman, Noor Suhana, Rohani, Abu Bakar, Norrozila, Sulaiman
Format: Article
Language:en
Published: WASET 2012
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/21196/1/WASET-A-Review-on-Soft-Computing-Technique-in-Intrusion-Detection-System.pdf
http://umpir.ump.edu.my/id/eprint/21196/
https://waset.org/publications/13529/a-review-on-soft-computing-technique-in-intrusion-detection-system
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1831525541805555712
author Sulaiman, Noor Suhana
Rohani, Abu Bakar
Norrozila, Sulaiman
author_facet Sulaiman, Noor Suhana
Rohani, Abu Bakar
Norrozila, Sulaiman
author_sort Sulaiman, Noor Suhana
building UMPSA Library
collection Institutional Repository
content_provider Universiti Malaysia Pahang Al-Sultan Abdullah
content_source UMPSA Institutional Repository
continent Asia
country Malaysia
description Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals with a huge amount of data which contains irrelevant and redundant features causing slow training and testing process, higher resource consumption as well as poor detection rate. Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible. Hence, the primary objective of this review is to review the techniques prior to classification process suit to IDS data.
format Article
id my.ump.umpir.21196
institution Universiti Malaysia Pahang
language en
publishDate 2012
publisher WASET
record_format eprints
spelling my.ump.umpir.211962018-05-25T06:36:34Z http://umpir.ump.edu.my/id/eprint/21196/ A Review on Soft Computing Technique in Intrusion Detection System Sulaiman, Noor Suhana Rohani, Abu Bakar Norrozila, Sulaiman QA75 Electronic computers. Computer science Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals with a huge amount of data which contains irrelevant and redundant features causing slow training and testing process, higher resource consumption as well as poor detection rate. Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible. Hence, the primary objective of this review is to review the techniques prior to classification process suit to IDS data. WASET 2012 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/21196/1/WASET-A-Review-on-Soft-Computing-Technique-in-Intrusion-Detection-System.pdf Sulaiman, Noor Suhana and Rohani, Abu Bakar and Norrozila, Sulaiman (2012) A Review on Soft Computing Technique in Intrusion Detection System. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 6 (12). pp. 1-6. (Published) https://waset.org/publications/13529/a-review-on-soft-computing-technique-in-intrusion-detection-system
spellingShingle QA75 Electronic computers. Computer science
Sulaiman, Noor Suhana
Rohani, Abu Bakar
Norrozila, Sulaiman
A Review on Soft Computing Technique in Intrusion Detection System
title A Review on Soft Computing Technique in Intrusion Detection System
title_full A Review on Soft Computing Technique in Intrusion Detection System
title_fullStr A Review on Soft Computing Technique in Intrusion Detection System
title_full_unstemmed A Review on Soft Computing Technique in Intrusion Detection System
title_short A Review on Soft Computing Technique in Intrusion Detection System
title_sort review on soft computing technique in intrusion detection system
topic QA75 Electronic computers. Computer science
url http://umpir.ump.edu.my/id/eprint/21196/1/WASET-A-Review-on-Soft-Computing-Technique-in-Intrusion-Detection-System.pdf
http://umpir.ump.edu.my/id/eprint/21196/
https://waset.org/publications/13529/a-review-on-soft-computing-technique-in-intrusion-detection-system
url_provider http://umpir.ump.edu.my/