2019
DOI: 10.1145/3344382
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Intrusion Detection Systems Leveraging Host Data

Abstract: This survey focuses on intrusion detection systems (IDS) that leverage host-based data sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is organized by the input data source, presenting targeted sub-surveys of HIDS research leveraging system logs, audit data, Windows Registry, file systems, and program analysis. While system calls are generally included in audit data, several publicly available system call datasets have spawned a flurry of IDS research on this topic, wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(42 citation statements)
references
References 85 publications
0
42
0
Order By: Relevance
“…Any detection system has three fundamental components: a data collection sensor, pre-processing data functions, and a decision engine [18]. A sensor can either retrieve or be given data in the form of host data and/or network traffic.…”
Section: Detection Methodsmentioning
confidence: 99%
“…Any detection system has three fundamental components: a data collection sensor, pre-processing data functions, and a decision engine [18]. A sensor can either retrieve or be given data in the form of host data and/or network traffic.…”
Section: Detection Methodsmentioning
confidence: 99%
“…Main objectives Aburomman et al [15] IDS based on ensemble and hybrid classifiers Zhou et al [16] Collaborative IDS against coordinated attacks Arshad et al [17] Computational overhead, energy consumption and privacy implications of IDS for IoT Berman et al [18] Deep learning methods applied for cybersecurity Bridges et al [19] IDS leveraging host data Buczak et al [20] IDS based on data mining and machine learning approaches Chandola et al [21] Anomaly detection techniques in general Mitchell et al [22] IDS for cyber-physical systems Tong et al [9] IDS for advanced metering infrastructure Grammatikis et al [23] IDS for SG ecosystems and subsystems Ring et al [24] Network-based IDS datasets…”
Section: Referencesmentioning
confidence: 99%
“…Berman et al [18] give a comprehensive review of deep learning methods applied for cybersecurity. A survey of IDS only considering host-based approaches is presented by Bridges et al [19]. Buczak et al [20] present a summary of IDS leveraging data mining and machine learning approaches and propose that the methods for fast incremental learning should be further exploited.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, ad hoc vehicular networks have become another area of growing interest in network IDS [14], cloud service frameworks have been proposed to enable intrusion detection mechanisms [15], as well as attack detection fremeworks for the vehicle communication bus [16]. Host IDS detect attacks based on system logs, audit data, Windows Registry, file systems, system calls, and program analysis [17]. Two of the most important areas of interest in host IDS are embedded systems [18] and the Android operating system [19], [20].…”
Section: Related Workmentioning
confidence: 99%