Proceedings of the Fourth International Conference on Engineering &Amp; MIS 2018 2018
DOI: 10.1145/3234698.3234743
|View full text |Cite
|
Sign up to set email alerts
|

An Extensive Survey on Intrusion Detection- Past, Present, Future

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 46 publications
0
4
0
Order By: Relevance
“…He further presented a comprehensive comparative study on iCloud, Dropbox and Google Drive and how they go about securing their various cloud infrastructure. Similarly, [23] [24] [25] and [26] all carried out extensive surveys on IDS deployment in cloud-based environment. However, all these authors failed to address the use of deception-based techniques for intrusion detection in cloud-based platforms.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…He further presented a comprehensive comparative study on iCloud, Dropbox and Google Drive and how they go about securing their various cloud infrastructure. Similarly, [23] [24] [25] and [26] all carried out extensive surveys on IDS deployment in cloud-based environment. However, all these authors failed to address the use of deception-based techniques for intrusion detection in cloud-based platforms.…”
Section: Related Workmentioning
confidence: 99%
“…[28] highlighted some key technology-and business-related challenges in designing and deploying honey pot systems on cloud computing. Likewise, [26] presents an extensive survey on intrusion detection, including methods used for obtain feature selection, computation of high dimensional data, and choice of learning algorithm. [29] stresses the importance of web-based applications and extensively outlines the possible use scenarios of deception techniques which can be incorporated into application-layer traffic of web applications for detecting various web-based application attacks.…”
Section: Related Workmentioning
confidence: 99%
“…An accuracy of 99.7% is reported on NSL-KDD dataset. A recent survey on intrusion detection techniques discussed various issues in designing an efficient intrusion system and some of the state of art contributions [18], [26].…”
Section: Background and Motivationmentioning
confidence: 99%
“…Each of the four categories to anomaly-based detection are evaluated based on the computational complexity among approaches of that type, the most significant network attacks and what the output is in each technique. Nagaraja and Kumar [119] summarized various studies over the span of six years and presented their techniques, year published, identification and the dataset used. Their conclusion was that the main research problem pertained to reducing high dimensional data and that many of the intrusion attacks were SQL-based.…”
Section: Introductionmentioning
confidence: 99%