2017
DOI: 10.12691/jcn-4-1-5
|View full text |Cite
|
Sign up to set email alerts
|

Big Data in Intrusion Detection Systems and Intrusion Prevention Systems

Abstract: This paper introduces network attacks, intrusion detection systems, intrusion prevention systems, and intrusion detection methods including signature-based detection and anomaly-based detection. Intrusion detection/prevention system (ID/PS) methods are compared. Some data mining and machine learning methods and their applications in intrusion detection are introduced. Big data in intrusion detection systems and Big Data analytics for huge volume of data, heterogeneous features, and real-time stream processing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…Although UTM features have been discussed here, the issue is that it’s used for small security solutions. The Lidong Wang et al paper discussed intrusion, typically done by individuals outside the association [ 33 ]. The IDS/IPS intrusion detection and intrusion prevention system are discussed to deal with intrusion detection; however, IDS/IPS are not useful in all situations.…”
Section: Related Workmentioning
confidence: 99%
“…Although UTM features have been discussed here, the issue is that it’s used for small security solutions. The Lidong Wang et al paper discussed intrusion, typically done by individuals outside the association [ 33 ]. The IDS/IPS intrusion detection and intrusion prevention system are discussed to deal with intrusion detection; however, IDS/IPS are not useful in all situations.…”
Section: Related Workmentioning
confidence: 99%
“…The work done in can be consulted for further reading [23] as it compared the various approaches using features, advantages, and disadvantages of each approach. [5] proposed "an efficient hybrid system for anomaly detection in social networks".…”
Section: Mechanisms For Intrusion Detectionmentioning
confidence: 99%
“…Lack of knowledge of packet payload causes poor performance of anomaly-based detection on application level, while in signature-based, an intense and strong analysis has been done on the payload of packet to extract unique signatures. Signature-based approach provides a high accuracy on existing attacks [44].…”
Section: Additionalmentioning
confidence: 99%