A survey of intrusion detection and prevention systems

被引:59
|
作者
Patel A. [1 ,2 ]
Qassim Q. [1 ]
Wills C. [2 ]
机构
[1] Department of Computer Science, Faculty of Information Science and Technology, National University of Malaysia, Bangi
[2] Faculty of Computing Information Systems and Mathematics, Kingston University, Kingston upon Thames
来源
关键词
Data security; Information management; Risk management;
D O I
10.1108/09685221011079199
中图分类号
学科分类号
摘要
Purpose: The problem of protecting information and data flows has existed from the very first day of information exchange. Various approaches have been devised to protect and transfer such information securely. However, as technology and communications advance and information management systems become more and more powerful and distributed, the problem has taken on new and more complex dimensions and has become a major challenge. The widespread use of wired and wireless communication networks, internet, web applications and computing has increased the gravity of the problem. Organizations are totally dependent on reliable, secure and fault-tolerant systems, communications, applications and information bases. Unfortunately, serious security and privacy breaches still occur every day, creating an absolute necessity to provide secure and safe information security systems through the use of firewalls, intrusion detection and prevention systems (ID/PSs), encryption, authentication and other hardware and software solutions. This paper aims to address these issues. Design/methodology/approach: This survey presents an up-to-date comprehensive state of the art overview of ID/PSs based on risk analysis, a description of what ID/PSs are, the functions they serve, its two primary types and different methods of ID that may employ. Findings: As security incidents are increasing and are more aggressive, ID/PSs have also become increasingly necessary, they compliment the arsenal of security measures, working in conjunction with other information security tools such as malware filters and firewalls. Because of a growing number of intrusion events and also because the internet and local networks together with user applications have become so ubiquitous, the need arises to use sophisticated advanced techniques from autonomic computing, machine learning, artificial intelligence and data mining to make intelligent/smart ID/PSs. Originality/value: This paper perceives the requirements of developing a new detection mechanism to detect known and unknown threats, based on intelligent techniques such as machine learning and autonomic computing. © Emerald Group Publishing Limited 0968-5227.
引用
收藏
页码:277 / 290
页数:13
相关论文
共 50 条
  • [41] A Survey of Intrusion Detection Systems for Cloud Computing Environment
    Chiba, Zouhair
    Abghour, Noureddine
    Moussaid, Khalid
    El Omri, Amina
    Rida, Mohamed
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [42] A survey of neural networks usage for intrusion detection systems
    Anna Drewek-Ossowicka
    Mariusz Pietrołaj
    Jacek Rumiński
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 497 - 514
  • [43] Intrusion Detection Systems for the Internet of Thing: A Survey Study
    Heba A. Hassan
    Ezz E. Hemdan
    Walid El-Shafai
    Mona Shokair
    Fathi E. Abd El-Samie
    Wireless Personal Communications, 2023, 128 : 2753 - 2778
  • [44] A Survey on Intrusion Detection Systems for Fog and Cloud Computing
    Chang, Victor
    Golightly, Lewis
    Modesti, Paolo
    Xu, Qianwen Ariel
    Doan, Le Minh Thao
    Hall, Karl
    Boddu, Sreeja
    FUTURE INTERNET, 2022, 14 (03):
  • [45] A Survey of Intrusion Detection Systems Leveraging Host Data
    Bridges, Robert A.
    Glass-Vanderlan, Tarrah R.
    Iannacone, Michael D.
    Vincent, Maria S.
    Chen, Qian
    ACM COMPUTING SURVEYS, 2020, 52 (06)
  • [46] A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    Butun, Ismail
    Morgera, Salvatore D.
    Sankar, Ravi
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 266 - 282
  • [47] A survey on intrusion detection and prevention in wireless ad-hoc networks
    Khan, Khalid
    Mehmood, Amjad
    Khan, Shafiullah
    Khan, Muhammad Altaf
    Iqbal, Zeeshan
    Mashwani, Wali Khan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105
  • [48] A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks
    Nadeem, Adnan
    Howarth, Michael P.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2027 - 2045
  • [49] Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey
    Jayalaxmi, P. L. S.
    Saha, Rahul
    Kumar, Gulshan
    Conti, Mauro
    Kim, Tai-Hoon
    IEEE ACCESS, 2022, 10 : 121173 - 121192
  • [50] TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems
    Wang, Xiaojun
    Cronin, Brendan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (03) : 63 - 76