Open Access Open Access  Restricted Access Subscription or Fee Access

An Improved Performance Evaluation on Collaborative Intrusion Detection System

S. Shahul Hameed Badusha, K.F. Imdadullah, A. Tamil Maran, S.S. Peer Mohamed


The main objective of this project is to provide better Performance Evaluation methods on Collaborative Intrusion Detection System. Collaborative Intrusion Detection System is implemented to detect the unauthorized users who exploit connection based and Script based Attacks. This Paper implements the concepts of Anomalous and Signature based Intrusion Detection Methods to achieve better detection rates and applies Receiver Operating Characteristics (ROC) & Intrusion Detection Capability (IDC) for better Performance Evaluation



Full Text:



William Stallings, “Cryptography and N/W Security”, Third Edition,2000

Atul Kahate,” Cryptography and N/W Security”,2006

Herbert Schildt, 2001, JAVA 2: The Complete Reference, TATA McGrawHill, Fourth Edition.

W.Lee,” A Framework for constructing Features and models for IDS”,Vol.3,No 4 ,Nov 2000.pp.227-261

D.J.Ragsdale, U.Pooch,” adaptation Techniques for Intrusion Detection and Response Systems”, Proc. IEEE Int’l Conference systems.pp.2344-2349, Oct.2000.

B.CaseWell and J.Beale,SNORT 2.1,Intrusion Detection, second ed.syngress,May 2004

H.Mannila and Toivonen, ”Discovring Generalized Episodes using Minimal Occurances”, second .Knowledge Discovery and Data Mining, 1996.

J.E. Gaffney and Ulvia : “ Evaluation of Intrusion Detectors, a decision theory approach”,2001.

Chunfu Jia and Deqiang Cheng: “Performance Evaluation of a Collaborative Intrusion Detection System “, 2009.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.