8Nature Inspired Approach for Intrusion Detection Systems
Mohd Shahid Husain
Information Technology Department, Ibri College of Applied Sciences, Ministry of Higher Education, MoHE, Oman
Abstract
Unauthorized access of network resources is one of the major security issues in communication network. Intrusion detection systems are used to identify any intruder in a network by monitoring the activities over a communication network. When these Intruder detection systems find any abnormal activity in a network, it sends signals to administrators alarming the possible presence of intruder in the network system. This chapter deals with the concept of intrusion detection, approaches for detecting intrusion including passive as well active approaches, and how nature inspired approaches can be incorporated effectively for the purpose. The chapter also provide a brief about some top intrusion detection softwares available in the market.
Keywords: Intrusion detection, IDS, malicious nodes, network security, intrusion detection & prevention system, HIDS, NIDS, network intrusion detection, host based intrusion detection
8.1 Introduction
To make your communication over a network secure has been always a major concern. This issue of making your network secure is becomes more vital as the communication network has grown from traditional communication networks to ad hoc networks and now in Cloud computing environment.
One of the major security issues in communication network is unauthorized ...
Get Design and Analysis of Security Protocol for Communication now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.