tailieunhanh - Hybrid approach using intrusion detection system

In this research article, we have proposed a new technique that will tackle with all these different intrusion attacks. We propose a hybrid kind of approach that might be useful while facing these vicious network intrusion attacks. | International Journal of Computer Networks and Communications Security C VOL. 2, NO. 2, FEBRUARY 2014, 87–92 Available online at: ISSN 2308-9830 N C S Hybrid Approach using intrusion Detection System Tariq Ahamad1and Abdullah Aljumah2 1, 2 College of Computer Engineering & Sciences, Salman Bin Abdulaziz University, KSA E-mail: 1me_ahamad@ ABSTRACT The rapid growth of the computers that are interconnected, the crime rate has also increased and the ways to mitigate those crimes has become the important problem now. In the entire globe, organizations, higher learning institutions and governments are completely dependent on the computer networks which plays a major role in their daily operations. Hence the necessity for protecting those networked systems has also increased. An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. In this research article, we will try to analyse different intrusion detection approaches SVM, ANN, SOM , Fuzzy Logic. In this research article, we have proposed a new technique that will tackle with all these different intrusion attacks. We propose a hybrid kind of approach that might be useful while facing these vicious network intrusion attacks. Keywords: IDS, Fuzzy Logic, intrusion detection system, Hybrid Approach. 1 INTRODUCTION Currently, Internet information resources are actively growing, penetrating many spheres of social life. Information technologies are being introduced not only into private enterprises, but also in the provision of public services. With each passing day, more and more confidential transactions are carried out via the Internet. In connection with these trends, the question of computer networks security is starkly raised. Attackers have developed and actively use many types of network intrusion, most of which can