Skip to main content

A Survey on Hybrid Intrusion Detection Techniques

  • Conference paper
  • First Online:
Research in Intelligent and Computing in Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1254))

Abstract

In new era, information plays a key role for everyone, compromising with information may harmful to user or our society. Intrusion detection is a very useful tool to protect the information at host level as well as network level. Many researchers have proposed several techniques for intrusion detection. Presently, hybrid intrusion detection is a prime area of research in the field of intrusion detection system. In hybrid intrusion detection, more than one detection methods are considered together to take the advantage of many techniques in a single model. In this paper, a survey of intrusion detection system (IDS) and hybrid techniques for intrusion detection is presented. The aim of this survey is to motivate the researcher in the area of hybrid intrusion detection techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gupta A, Bhati BS, Jain V (2014) Artificial intrusion detection techniques: a survey. Int J Comput Network Inform Secur 6(9):51

    Google Scholar 

  2. Bace R, Mell P (2001) NIST special publication on intrusion detection systems. Booz-Allen and Hamilton Inc., Mclean

    Google Scholar 

  3. Bhati BS, Rai CS (2016) Intrusion detection systems and techniques: a review. Int J Critical Comput Syst 6(3):173–190. https://doi.org/10.1504/IJCCBS.2016.079077

    Article  Google Scholar 

  4. Lundin E, Jonsson E (2002) Survey of intrusion detection research. Chalmers University of Technology

    Google Scholar 

  5. Bhati BS, Rai CS (2019). Analysis of support vector machine-based intrusion detection techniques. Arab J Sci Eng 1–13

    Google Scholar 

  6. García-Teodoro P, Díaz-Verdej J, Maciá-Fernández G, Vázquez E (2008) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1):109–115

    Google Scholar 

  7. Jyothsna V, Prasad VVR, Prasad KM (2011) A review of anomaly based intrusiondetection systems. Int J Comput Appl 28(7):26–35

    Google Scholar 

  8. Liang H (2014) An improved intrusion detection based on neural network and fuzzy algorithm. J Networks 9(5):1274–1280

    Google Scholar 

  9. Malik AJ, Shahzad W, Khan FA (2012) Network intrusion detection using hybrid binary PSO and random forests algorithm. Security and Communication Network [online]. http://onlinelibrary.wiley.com/doi/10.1002/sec.508/full. Acessed 02 Dec 2019

  10. Panda M, Abraham A, Patra MR (2011) A hybrid intelligent approach for network intrusion detection. In: International conference on communication technology and system design, pp 1–9

    Google Scholar 

  11. Govindarajan M, Chandrasekaran RM (2011) Intrusion detection using neural based hybrid classification methods. Comput Networks 55(8):1662–1671

    Google Scholar 

  12. Jemili F, Zaghdoud M, Ahmed MB (2009) Intrusion detection based on “Hybrid” propagation in Bayesian networks. In: 2009 IEEE international conference on intelligence and security informatics. IEEE, pp 137–142

    Google Scholar 

  13. Li F (2010) Hybrid neural network intrusion detection system using genetic algorithm. In: 2010 International conference on multimedia technology. IEEE, pp 1–4

    Google Scholar 

  14. Karthick RR, Hattiwale VP, Ravindran B (2012) Adaptive network intrusion detection system using a hybrid approach. In: 2012 fourth international conference on communication systems and networks (COMSNETS 2012). IEEE, pp 1–7

    Google Scholar 

  15. Tong X, Wang Z, Yu H (2009) A research using hybrid RBF/Elman neural networks for intrusion detection system secure model. Comput Phys Commun 180(10):1795–1801

    Article  Google Scholar 

  16. Aydın MA, Zaim AH, Ceylan KG (2009) A hybrid intrusion detection system design for computer network security. Comput Electr Eng 35(3):517–526

    Article  MATH  Google Scholar 

  17. Kumar PG, Devaraj D (2007) Network intrusion detection using hybrid neural networks. In: 2007 international conference on signal processing, communications and networking. IEEE, pp 563–569

    Google Scholar 

  18. Bashah N, Shanmugam IB, Ahmed AM (2005) Hybrid intelligent intrusion detection system. World Acad Sci Eng Technol 11:23–26

    Google Scholar 

  19. Bahrololum M, Salahi E, Khaleghi M (2009) Anomaly intrusion detection design using hybrid of unsupervised and supervised neural network. Int J Comput Networks Commun (IJCNC) 1(2):26–33

    Google Scholar 

  20. Ahmim A, Maglaras L, Ferrag MA, Derdour M, Janicke H (2019) A novel hierarchical intrusion detection system based on decision tree and rules-based models. In: 2019 15th international conference on distributed computing in sensor systems (DCOSS). IEEE, pp 228–233

    Google Scholar 

  21. Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160

    Article  Google Scholar 

  22. Cepheli Ö, Büyükçorak S, Karabulut Kurt G (2016) Hybrid intrusion detection system for ddos attacks. J Electr Comput Eng

    Google Scholar 

  23. Kamarudin MH, Maple C, Watson T (2019) Hybrid feature selection technique for intrusion detection system. Int J High Perform Comput Network 13(2):232–240

    Article  Google Scholar 

  24. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2020) Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine. Electronics 9(1):173

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitesh Singh Bhati .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhati, N.S., Khari, M. (2021). A Survey on Hybrid Intrusion Detection Techniques. In: Kumar, R., Quang, N.H., Kumar Solanki, V., Cardona, M., Pattnaik, P.K. (eds) Research in Intelligent and Computing in Engineering. Advances in Intelligent Systems and Computing, vol 1254. Springer, Singapore. https://doi.org/10.1007/978-981-15-7527-3_77

Download citation

Publish with us

Policies and ethics