comparative Analysis of Intrusion Detection Approaches

Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Furthe...

Full description

Bibliographic Details
Main Authors: I., Ahmad, Azween, Abdullah, Alghamdi, Abdullah
Format: Conference or Workshop Item
Language:English
Published: 2010
Subjects:
Online Access:http://scholars.utp.edu.my/id/eprint/2560/
http://scholars.utp.edu.my/id/eprint/2560/1/Comparative_Analysis_of_Intrusion_Detection_Approaches.pdf
_version_ 1848659264947617792
author I., Ahmad
Azween, Abdullah
Alghamdi, Abdullah
author_facet I., Ahmad
Azween, Abdullah
Alghamdi, Abdullah
author_sort I., Ahmad
building UTP Institutional Repository
collection Online Access
description Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Further, these approaches are used in intrusion detection systems. Therefore, in this paper, we evaluated them so that a suitable approach may be advised to intrusion detection systems. This work describes the concepts, tool and methodology being used for evaluation analysis of different intrusion detection approaches using multi-criteria decision making technique. Moreover, conclusion on results is made and direction for future works is presented.
first_indexed 2025-11-13T07:27:40Z
format Conference or Workshop Item
id oai:scholars.utp.edu.my:2560
institution Universiti Teknologi Petronas
institution_category Local University
language English
last_indexed 2025-11-13T07:27:40Z
publishDate 2010
recordtype eprints
repository_type Digital Repository
spelling oai:scholars.utp.edu.my:25602017-03-20T01:59:58Z http://scholars.utp.edu.my/id/eprint/2560/ comparative Analysis of Intrusion Detection Approaches I., Ahmad Azween, Abdullah Alghamdi, Abdullah QA75 Electronic computers. Computer science Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Further, these approaches are used in intrusion detection systems. Therefore, in this paper, we evaluated them so that a suitable approach may be advised to intrusion detection systems. This work describes the concepts, tool and methodology being used for evaluation analysis of different intrusion detection approaches using multi-criteria decision making technique. Moreover, conclusion on results is made and direction for future works is presented. 2010 Conference or Workshop Item PeerReviewed application/pdf en http://scholars.utp.edu.my/id/eprint/2560/1/Comparative_Analysis_of_Intrusion_Detection_Approaches.pdf I., Ahmad and Azween, Abdullah and Alghamdi, Abdullah (2010) comparative Analysis of Intrusion Detection Approaches. In: 12th International Conference on Computer Modelling and Simulation (UKSim), 2010 , 24-26 March 2010 , u.k.
spellingShingle QA75 Electronic computers. Computer science
I., Ahmad
Azween, Abdullah
Alghamdi, Abdullah
comparative Analysis of Intrusion Detection Approaches
title comparative Analysis of Intrusion Detection Approaches
title_full comparative Analysis of Intrusion Detection Approaches
title_fullStr comparative Analysis of Intrusion Detection Approaches
title_full_unstemmed comparative Analysis of Intrusion Detection Approaches
title_short comparative Analysis of Intrusion Detection Approaches
title_sort comparative analysis of intrusion detection approaches
topic QA75 Electronic computers. Computer science
url http://scholars.utp.edu.my/id/eprint/2560/
http://scholars.utp.edu.my/id/eprint/2560/1/Comparative_Analysis_of_Intrusion_Detection_Approaches.pdf