comparative Analysis of Intrusion Detection Approaches
Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Furthe...
| Main Authors: | , , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/2560/ http://scholars.utp.edu.my/id/eprint/2560/1/Comparative_Analysis_of_Intrusion_Detection_Approaches.pdf |
| _version_ | 1848659264947617792 |
|---|---|
| author | I., Ahmad Azween, Abdullah Alghamdi, Abdullah |
| author_facet | I., Ahmad Azween, Abdullah Alghamdi, Abdullah |
| author_sort | I., Ahmad |
| building | UTP Institutional Repository |
| collection | Online Access |
| description | Information security is a serious issue especially in
present age because a solo attack may cause a big harm in
computer and network systems. Several intrusion detection
approaches exist to tackle this critical issue but the problem is
which one is more suitable in the field of intrusion. Further,
these approaches are used in intrusion detection systems.
Therefore, in this paper, we evaluated them so that a suitable
approach may be advised to intrusion detection systems. This
work describes the concepts, tool and methodology being used
for evaluation analysis of different intrusion detection
approaches using multi-criteria decision making technique.
Moreover, conclusion on results is made and direction for
future works is presented. |
| first_indexed | 2025-11-13T07:27:40Z |
| format | Conference or Workshop Item |
| id | oai:scholars.utp.edu.my:2560 |
| institution | Universiti Teknologi Petronas |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-13T07:27:40Z |
| publishDate | 2010 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | oai:scholars.utp.edu.my:25602017-03-20T01:59:58Z http://scholars.utp.edu.my/id/eprint/2560/ comparative Analysis of Intrusion Detection Approaches I., Ahmad Azween, Abdullah Alghamdi, Abdullah QA75 Electronic computers. Computer science Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Further, these approaches are used in intrusion detection systems. Therefore, in this paper, we evaluated them so that a suitable approach may be advised to intrusion detection systems. This work describes the concepts, tool and methodology being used for evaluation analysis of different intrusion detection approaches using multi-criteria decision making technique. Moreover, conclusion on results is made and direction for future works is presented. 2010 Conference or Workshop Item PeerReviewed application/pdf en http://scholars.utp.edu.my/id/eprint/2560/1/Comparative_Analysis_of_Intrusion_Detection_Approaches.pdf I., Ahmad and Azween, Abdullah and Alghamdi, Abdullah (2010) comparative Analysis of Intrusion Detection Approaches. In: 12th International Conference on Computer Modelling and Simulation (UKSim), 2010 , 24-26 March 2010 , u.k. |
| spellingShingle | QA75 Electronic computers. Computer science I., Ahmad Azween, Abdullah Alghamdi, Abdullah comparative Analysis of Intrusion Detection Approaches |
| title | comparative Analysis of Intrusion Detection Approaches |
| title_full | comparative Analysis of Intrusion Detection Approaches |
| title_fullStr | comparative Analysis of Intrusion Detection Approaches |
| title_full_unstemmed | comparative Analysis of Intrusion Detection Approaches |
| title_short | comparative Analysis of Intrusion Detection Approaches |
| title_sort | comparative analysis of intrusion detection approaches |
| topic | QA75 Electronic computers. Computer science |
| url | http://scholars.utp.edu.my/id/eprint/2560/ http://scholars.utp.edu.my/id/eprint/2560/1/Comparative_Analysis_of_Intrusion_Detection_Approaches.pdf |