A survey of intrusion detection and prevention systems

被引:59
|
作者
Patel A. [1 ,2 ]
Qassim Q. [1 ]
Wills C. [2 ]
机构
[1] Department of Computer Science, Faculty of Information Science and Technology, National University of Malaysia, Bangi
[2] Faculty of Computing Information Systems and Mathematics, Kingston University, Kingston upon Thames
来源
关键词
Data security; Information management; Risk management;
D O I
10.1108/09685221011079199
中图分类号
学科分类号
摘要
Purpose: The problem of protecting information and data flows has existed from the very first day of information exchange. Various approaches have been devised to protect and transfer such information securely. However, as technology and communications advance and information management systems become more and more powerful and distributed, the problem has taken on new and more complex dimensions and has become a major challenge. The widespread use of wired and wireless communication networks, internet, web applications and computing has increased the gravity of the problem. Organizations are totally dependent on reliable, secure and fault-tolerant systems, communications, applications and information bases. Unfortunately, serious security and privacy breaches still occur every day, creating an absolute necessity to provide secure and safe information security systems through the use of firewalls, intrusion detection and prevention systems (ID/PSs), encryption, authentication and other hardware and software solutions. This paper aims to address these issues. Design/methodology/approach: This survey presents an up-to-date comprehensive state of the art overview of ID/PSs based on risk analysis, a description of what ID/PSs are, the functions they serve, its two primary types and different methods of ID that may employ. Findings: As security incidents are increasing and are more aggressive, ID/PSs have also become increasingly necessary, they compliment the arsenal of security measures, working in conjunction with other information security tools such as malware filters and firewalls. Because of a growing number of intrusion events and also because the internet and local networks together with user applications have become so ubiquitous, the need arises to use sophisticated advanced techniques from autonomic computing, machine learning, artificial intelligence and data mining to make intelligent/smart ID/PSs. Originality/value: This paper perceives the requirements of developing a new detection mechanism to detect known and unknown threats, based on intelligent techniques such as machine learning and autonomic computing. © Emerald Group Publishing Limited 0968-5227.
引用
收藏
页码:277 / 290
页数:13
相关论文
共 50 条
  • [21] Security configuration management in Intrusion Detection and Prevention Systems
    Alsubhi, K.
    Alhazmi, Y.
    Bouabdallah, N.
    Boutaba, R.
    International Journal of Security and Networks, 2012, 7 (01) : 30 - 39
  • [22] Benefits of the Virtualization Technologies with Intrusion Detection and Prevention Systems
    Caliskan, Murat
    Ozsiginan, Mustafa
    Kugu, Emin
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 194 - 198
  • [23] Smartphone Nabbing: Analysis of Intrusion Detection and Prevention Systems
    Vij, Sonakshi
    Jain, Amita
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2209 - 2214
  • [24] Rule Mode Selection in Intrusion Detection and Prevention Systems
    Alsubhi, Khalid
    Alhazmi, Yassir
    Bouabdallah, Nizar
    Boutaba, Raouf
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [25] Intrusion detection and prevention systems in industrial IoT network
    Sharma, Sangeeta
    Kumar, Ashish
    Rathore, Navdeep Singh
    Sharma, Shivanshu
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [26] Analysis of Intrusion Detection and Prevention Systems as Queueing Services
    Zapechnikov, Sergey
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 855 - 860
  • [27] Network Systems Intrusion: Concept, Detection, Decision, and Prevention
    Pleskonjic, Dragan
    Omerovic, Sanida
    Tomazic, Saso
    IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2007, 3 (01): : 40 - 49
  • [28] Intrusion Detection and Prevention Systems (IDPS) and Security Issues
    Sharifi, A. Ahmad
    Noorollahi, B. Akram
    Farokhmanesh, Farnoosh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (11): : 80 - 84
  • [29] A Survey on Types of Machine Learning Techniques in Intrusion Prevention Systems
    Das, Soubhik
    Nene, Manisha J.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2296 - 2299
  • [30] A survey of Intrusion Detection Systems for Wireless Sensor Networks
    Farooqi, Ashfaq Hussain
    Khan, Farrukh Aslam
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (02) : 69 - 83