A Comprehensive Review of Various Approaches to Intrusion Detection Systems

被引:1
|
作者
Shinde, Swati [1 ]
Borde, Tejas [1 ]
Deo, Aditya [1 ]
Dhamak, Suraj [1 ]
Dungarwal, Shreyas [1 ]
机构
[1] Pimpri Chinchwad Coll Engn, Pune 411035, Maharashtra, India
关键词
Networks; Deep learning; Wireless networks; Machine learning intrusion detection systems;
D O I
10.1007/978-981-19-6581-4_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The extensive usage of the Internet to communicate and transfer data might succumb to various network related threats. Intrusions are one such threat, where the client/organization is at a risk of data theft. An intruder is someone who gains unauthorized access to our network or system. A network falling prey to an intrusion might result in loss of valuable data. A solution to intrusions is intrusion detection systems (IDS). This paper provides a comprehensive review of approaches to build IDS. The first section covers a review of the fundamentals of IDS, covering various intrusion types and IDSs, their strengths and their limitations. The next section discusses intrusions in wireless networks, followed by a review of a wireless approach to intrusion detection systems for IEEE 802.11 networks. The next section takes a look at various deep learning and machine learning approaches to intrusion detection systems that are currently being implemented. It summarizes the benchmark datasets that are currently being used to implement models for intrusion detection, followed by the results of a few machine learning models implemented on the NSL-KDD dataset.
引用
收藏
页码:177 / 189
页数:13
相关论文
共 50 条
  • [41] A comprehensive review of approaches to building occupancy detection
    Rueda, Luis
    Agbossou, Kodjo
    Cardenas, Alben
    Henao, Nilson
    Kelouwani, Sousso
    BUILDING AND ENVIRONMENT, 2020, 180
  • [42] Multiagent Systems for Network Intrusion Detection: A Review
    Herrero, Alvaro
    Corchado, Emilio
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2009, 63 : 143 - 154
  • [43] Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review
    Kabla, Arkan Hammoodi Hasan
    Anbar, Mohammed
    Manickam, Selvakumar
    Al-Amiedy, Taief Alaa
    Cruspe, Peterson Bernabe
    Al-Ani, Ahmed K.
    Karuppayah, Shankar
    IEEE ACCESS, 2022, 10 : 71632 - 71655
  • [44] Comprehensive evaluation of intrusion detection systems based on fuzzy methods
    School of Information Engineering, Beijing University of Science and Technology, Beijing 100083, China
    不详
    Jisuanji Gongcheng, 2006, 8 (155-156+234):
  • [45] Intrusion Detection System in Wireless Sensor Networks: A Comprehensive Review
    Duhan, Sonu
    Khandnor, Padmavati
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2707 - 2712
  • [46] A Comprehensive Survey on Intrusion Detection Systems in Wireless Sensor Network
    Dhakne, Amol R.
    Chatur, P. N.
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 541 - 549
  • [47] Various Approaches to Driver Fatigue Detection: A Review
    Stork, M.
    Skala, J.
    Weissar, P.
    Holota, R.
    Kubik, Z.
    2015 INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2015, : 239 - 242
  • [48] A review of recent approaches on wrapper feature selection for intrusion detection
    Maldonado, Javier
    Cristina Riff, Maria
    Neveu, Bertrand
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 198
  • [49] Understanding and Study of Intrusion Detection Systems for various Networks and Domains
    Shah, Jubeen
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [50] Addressing Class Imbalance in Intrusion Detection: A Comprehensive Evaluation of Machine Learning Approaches
    Shanmugam, Vaishnavi
    Razavi-Far, Roozbeh
    Hallaji, Ehsan
    ELECTRONICS, 2025, 14 (01):