ABSTRACT

Intrusion Detection Systems (IDS) play an essential task in monitoring and observing intruders in network traffic and reporting them to network administrators for analysis and the necessary action. This solution comes either in a hardware base (dedicated appliance) or in a software base. In this chapter, we discuss IDS approaches and methodology, and different types of computer and network attacks. We describe the latest trends, issues, and future research issues in intrusion detection systems. What is expected from IDS is preventive actions to counter malicious objects. Timely responses and real-time techniques are to be embedded in current IDS systems during the design process. The accuracy of any ID system depends on datasets, which the system evaluates. Performance depends on the same datasets. In this chapter, we address the emerging research issues in designing reliable and accurate ID systems.