A Review on Soft Computing Technique in Intrusion Detection System
Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (I...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
WASET
2012
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/21196/ http://umpir.ump.edu.my/id/eprint/21196/ http://umpir.ump.edu.my/id/eprint/21196/1/WASET-A-Review-on-Soft-Computing-Technique-in-Intrusion-Detection-System.pdf |
Summary: | Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals with a huge amount of data which contains irrelevant
and redundant features causing slow training and testing process, higher resource consumption as well as poor detection rate. Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible. Hence, the primary objective of this review is to review the techniques prior to classification process suit to IDS data. |
---|