A survey of intrusion detection system technologies

Ross Heenan, Naghmeh Moradpoor

Research output: Contribution to conferencePaper

386 Downloads (Pure)

Abstract

This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.
Original languageEnglish
Number of pages5
Publication statusPublished - 10 May 2016
Event The First Post Graduate Cyber Security Symposium - Edinburgh Napier University, Edinburgh, United Kingdom
Duration: 10 May 201610 May 2016

Conference

Conference The First Post Graduate Cyber Security Symposium
Abbreviated titlePGCS
CountryUnited Kingdom
CityEdinburgh
Period10/05/1610/05/16

Fingerprint

Intrusion detection
Data acquisition
Specifications

Cite this

Heenan, R., & Moradpoor, N. (2016). A survey of intrusion detection system technologies. Paper presented at The First Post Graduate Cyber Security Symposium , Edinburgh, United Kingdom.
Heenan, Ross ; Moradpoor, Naghmeh. / A survey of intrusion detection system technologies. Paper presented at The First Post Graduate Cyber Security Symposium , Edinburgh, United Kingdom.5 p.
@conference{1dfed5b6267147689054aabd23237ce3,
title = "A survey of intrusion detection system technologies",
abstract = "This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.",
author = "Ross Heenan and Naghmeh Moradpoor",
year = "2016",
month = "5",
day = "10",
language = "English",
note = "The First Post Graduate Cyber Security Symposium , PGCS ; Conference date: 10-05-2016 Through 10-05-2016",

}

Heenan, R & Moradpoor, N 2016, 'A survey of intrusion detection system technologies' Paper presented at The First Post Graduate Cyber Security Symposium , Edinburgh, United Kingdom, 10/05/16 - 10/05/16, .

A survey of intrusion detection system technologies. / Heenan, Ross; Moradpoor, Naghmeh.

2016. Paper presented at The First Post Graduate Cyber Security Symposium , Edinburgh, United Kingdom.

Research output: Contribution to conferencePaper

TY - CONF

T1 - A survey of intrusion detection system technologies

AU - Heenan, Ross

AU - Moradpoor, Naghmeh

PY - 2016/5/10

Y1 - 2016/5/10

N2 - This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.

AB - This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.

M3 - Paper

ER -

Heenan R, Moradpoor N. A survey of intrusion detection system technologies. 2016. Paper presented at The First Post Graduate Cyber Security Symposium , Edinburgh, United Kingdom.