2019
DOI: 10.1186/s42400-019-0038-7
|View full text |Cite
|
Sign up to set email alerts
|

Survey of intrusion detection systems: techniques, datasets and challenges

Abstract: Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and availability. Numerous intrusion detection methods have been proposed in the literature to tackle computer security threats, which can be broadly classified into Signature-based Intrusion Detection Systems (SIDS) and Anomaly-based Intrusion Detection Systems (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
427
0
20

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 911 publications
(448 citation statements)
references
References 98 publications
(76 reference statements)
1
427
0
20
Order By: Relevance
“…Table 1 shows the IDS techniques and datasets covered by different intrusion detection system survey papers. Khraisat et al presented a survey of current intrusion detection systems, which was a wide-ranging review of ID technqiues, and the datasets usually employed for evaluation purposes [4]. Several intrusion detection system techniques that have been developed to improve the detection rate.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 1 shows the IDS techniques and datasets covered by different intrusion detection system survey papers. Khraisat et al presented a survey of current intrusion detection systems, which was a wide-ranging review of ID technqiues, and the datasets usually employed for evaluation purposes [4]. Several intrusion detection system techniques that have been developed to improve the detection rate.…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection systems (IDS) detect suspicious activities and known threats and generate alerts. Intrusions could be identified as any activity that causes damage to an information system [4]. IDS could be software or hardware systems capable of identifying any such malicious activities in computer systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The simulation results were displayed using a confusion matrix, which is shown in Table 1. The confusion matrix was designed for a two class classifier and was useful to evaluate the performance of the IDS [36]. After calculating the predicted value x t , the traffic prediction values were recovered by inverse difference and exponentiation.…”
Section: Scenariosmentioning
confidence: 99%
“…To evaluate the performance of the proposed method, four metrics were selected, the overall accuracy decision rates, false positive rate, false negative rate, and precision rate [36,37].…”
Section: Scenariosmentioning
confidence: 99%