2021
DOI: 10.1088/1742-6596/1874/1/012042
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System Techniques : A Review

Abstract: Nowadays, Internet attacks are increasing rapidly. As a result, information security is a serious global concern among Information Technology users. Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. IDS is such as a detective control, the main function is to warn the user of any suspicious activity taking place. Active IDS research are still ongoing with remarkable techniq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…They can also be categorized into two types according to the technologies used for analysis: misuse intrusion detection (also named signature-based detection or rulebased detection) and anomaly intrusion detection. (3,4) Numerous studies have proposed the use of machine learning for intrusion detection. The classification performance of an intrusion detection system is strongly related to the feature extraction and selection results.…”
Section: Introductionmentioning
confidence: 99%
“…They can also be categorized into two types according to the technologies used for analysis: misuse intrusion detection (also named signature-based detection or rulebased detection) and anomaly intrusion detection. (3,4) Numerous studies have proposed the use of machine learning for intrusion detection. The classification performance of an intrusion detection system is strongly related to the feature extraction and selection results.…”
Section: Introductionmentioning
confidence: 99%
“…In this section, the different kinds of IDS are discussed, and where appropriate, the limitations of each of these models has also been presented. Based on where they are deployed, i.e., the type of data they see, IDS can be classified into the following [23], [24]: • Host-based (HIDS): This system monitors the host/device/endpoint it is deployed in. Its functions include monitoring and analysing internals of a host such as configuration files and application activity, and comparing them with previous "snapshots" where applicable; and monitoring the host's participation in the network, etc.…”
Section: Types Of Intrusion Detection Systemsmentioning
confidence: 99%