2021
DOI: 10.11610/isij.5016
|View full text |Cite
|
Sign up to set email alerts
|

Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods

Abstract: Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detections methods. Failure to prevent the intrusions could jeopardise security services' credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(18 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…Examining cyberthreat trends and patterns necessitates thoroughly comprehending deception networks, honeypots, and decoy systems [6,11,12]. These systems are instrumental in intelligence gathering and serve as deterrents to cyberattacks, and have shown effectiveness in monitoring network traffic and identifying potential threats [6,[11][12][13].…”
Section: Introduction 1the Problemmentioning
confidence: 99%
“…Examining cyberthreat trends and patterns necessitates thoroughly comprehending deception networks, honeypots, and decoy systems [6,11,12]. These systems are instrumental in intelligence gathering and serve as deterrents to cyberattacks, and have shown effectiveness in monitoring network traffic and identifying potential threats [6,[11][12][13].…”
Section: Introduction 1the Problemmentioning
confidence: 99%
“…The sophistication of cyber intrusion techniques has grown significantly in the last ten years. This poses ever greater challenges for traditional IDS detection methods [52]. Intrusion detection methods are beneficial in guaranteeing that network administrators are correctly alerted to dangerous events [7].…”
Section: Discussionmentioning
confidence: 99%
“…The delimitation of this study was investigating signature-based intrusion detection systems. These systems match patterns to identify known attacks [52].…”
Section: Limitations and Implicationsmentioning
confidence: 99%
“…In modern linked world, NIDSs are imperative for protecting the accessibility, security, and reliability of data [4]. The two primary types of methods used by NIDSs to do this are signature-based detection and anomaly-based detection [5]. In order to be very effective in recognizing assaults using widely recognized signatures and structures, signature-based NIDSs rely on predefined attack patterns [6].…”
Section: Introductionmentioning
confidence: 99%