ISBN: 978-981-09-5471-0 DOI: 10.18178/wcse.2015.04.121
A Comprehensive Survey on Network Intrusion Detection Techniques
Abstract— In recent years, network attacks have become a problem of utmost importance which
greatly affects the availability of information, security and the correctness for the individuals as
well as businesses and government corporations. The problem has increased manifold with the
widespread use of the internet and due to the need to provide services to the end users at all times. I
it is impossible to develop foolproof systems that can stop intrusions but solutions exist to meet the
challenges regarding information security and its integrity. One of the solutions is to install a
firewall but it is not a fail-safe system since it cannot block the ports which remain open in order to
provide standard network services to the users. Therefore, it cannot completely guard the network
against the intrusion attempts. Another solution is to employ a network intrusion detection system
(NIDS) along with a firewall, which can successfully detect and stop intrusion detection attempts.
In this paper, a survey of network intrusion detection systems is presented. Various aspects
regarding the deployment of these systems in real life scenarios are analyzed and the main factors
which are responsible for the non-deployment of some of these innovative methods for
practical use today are identified.
Index Terms— Network Intrusion Detection System, Information Security, Signature Patterns,
Machine learning, Data mining.
Qazi Emad-ul-Haq, Hatim Aboalsamh, Jalal Al-Muhtadi, Muhammad Hussain, Wadood Abdul, Saeed Bamatraf
Department of Computer Science, College of Computer and Information Sciences, King Saud
University, SAUDI ARABIA
Sanaa Ghouzali
Department of Information Technology, College of Computer and Information Sciences, King
Saud University, SAUDI ARABIA
Cite: Qazi Emad-ul-Haq, Hatim Aboalsamh, Jalal Al-Muhtadi, Muhammad Hussain, Wadood Abdul, Sanaa Ghouzali, Saeed Bamatraf, "A Comprehensive Survey on Network Intrusion Detection Techniques," 2015 The 5th International Workshop on Computer Science and Engineering-Information Processing and Control Engineering (WCSE 2015-IPCE), pp. 762-769, Moscow, Russia, April 15-17, 2015.