A Review on Soft Computing Technique in Intrusion Detection System

Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (I...

Full description

Bibliographic Details
Main Authors: Sulaiman, Noor Suhana, Rohani, Abu Bakar, Norrozila, Sulaiman
Format: Article
Language:English
Published: WASET 2012
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/21196/
http://umpir.ump.edu.my/id/eprint/21196/
http://umpir.ump.edu.my/id/eprint/21196/1/WASET-A-Review-on-Soft-Computing-Technique-in-Intrusion-Detection-System.pdf
Description
Summary:Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals with a huge amount of data which contains irrelevant and redundant features causing slow training and testing process, higher resource consumption as well as poor detection rate. Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible. Hence, the primary objective of this review is to review the techniques prior to classification process suit to IDS data.