A survey of intrusion detection and prevention systems

被引:59
|
作者
Patel A. [1 ,2 ]
Qassim Q. [1 ]
Wills C. [2 ]
机构
[1] Department of Computer Science, Faculty of Information Science and Technology, National University of Malaysia, Bangi
[2] Faculty of Computing Information Systems and Mathematics, Kingston University, Kingston upon Thames
来源
关键词
Data security; Information management; Risk management;
D O I
10.1108/09685221011079199
中图分类号
学科分类号
摘要
Purpose: The problem of protecting information and data flows has existed from the very first day of information exchange. Various approaches have been devised to protect and transfer such information securely. However, as technology and communications advance and information management systems become more and more powerful and distributed, the problem has taken on new and more complex dimensions and has become a major challenge. The widespread use of wired and wireless communication networks, internet, web applications and computing has increased the gravity of the problem. Organizations are totally dependent on reliable, secure and fault-tolerant systems, communications, applications and information bases. Unfortunately, serious security and privacy breaches still occur every day, creating an absolute necessity to provide secure and safe information security systems through the use of firewalls, intrusion detection and prevention systems (ID/PSs), encryption, authentication and other hardware and software solutions. This paper aims to address these issues. Design/methodology/approach: This survey presents an up-to-date comprehensive state of the art overview of ID/PSs based on risk analysis, a description of what ID/PSs are, the functions they serve, its two primary types and different methods of ID that may employ. Findings: As security incidents are increasing and are more aggressive, ID/PSs have also become increasingly necessary, they compliment the arsenal of security measures, working in conjunction with other information security tools such as malware filters and firewalls. Because of a growing number of intrusion events and also because the internet and local networks together with user applications have become so ubiquitous, the need arises to use sophisticated advanced techniques from autonomic computing, machine learning, artificial intelligence and data mining to make intelligent/smart ID/PSs. Originality/value: This paper perceives the requirements of developing a new detection mechanism to detect known and unknown threats, based on intelligent techniques such as machine learning and autonomic computing. © Emerald Group Publishing Limited 0968-5227.
引用
收藏
页码:277 / 290
页数:13
相关论文
共 50 条
  • [1] A Survey on Intrusion Detection and Prevention Systems
    Gupta N.
    Jindal V.
    Bedi P.
    SN Computer Science, 4 (5)
  • [2] A Survey of Intrusion Detection and Prevention Systems
    Erney, Tristan
    Chowdhury, Md Minhaz
    2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 578 - 584
  • [3] High Performance Intrusion Detection and Prevention Systems: A Survey
    Potluri, Sasanka
    Diedrich, Christian
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 260 - 268
  • [4] A survey on intrusion detection and prevention systems in digital substations
    Quincozes, Silvio E.
    Albuquerque, Celio
    Passos, Diego
    Mosse, Daniel
    COMPUTER NETWORKS, 2021, 184
  • [5] A Review on Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT
    Prajapati, Priteshkumar
    Bhatt, Bhumika
    Zalavadiya, Gautam
    Ajwalia, Madhav
    Shah, Parth
    2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 588 - 593
  • [6] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Cai, Chuanxi
    Mei, Shue
    Zhong, Weijun
    INFORMATION TECHNOLOGY & MANAGEMENT, 2019, 20 (02): : 55 - 71
  • [7] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Chuanxi Cai
    Shue Mei
    Weijun Zhong
    Information Technology and Management, 2019, 20 : 55 - 71
  • [8] SDN based Intrusion Detection and Prevention Systems using Manufacturer Usage Description: A Survey
    Mazhar, Noman
    Salleh, Rosli
    Hossain, Mohammad Asif
    Zeeshan, Muhammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (12) : 717 - 737
  • [9] Network Intrusion Detection, Prevention and Sustainable Mechanisms: A Survey
    Kannari, Phanindra Reddy
    Shariff, Noorullah C.
    Biradar, Raj Kumar L.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (03) : 4712 - 4724
  • [10] Intrusion Detection and Prevention Systems: An Updated Review
    Azeez, Nureni Ayofe
    Bada, Taiwo Mayowa
    Misra, Sanjay
    Adewumi, Adewole
    Van der Vyver, Charles
    Ahuja, Ravin
    DATA MANAGEMENT, ANALYTICS AND INNOVATION, ICDMAI 2019, VOL 1, 2020, 1042 : 683 - 695