Review of Intrusion Detection Systems Taxonomy, Techniques, Methods and Future Research Directions

被引:2
作者
Mikulas, Matus [1 ]
Kotuliak, Ivan [1 ]
机构
[1] Slovak Univ Technol Bratislava, Fac Informat & Informat Technol, Bratislava, Slovakia
来源
2024 NEW TRENDS IN SIGNAL PROCESSING, NTSP 2024 | 2024年
关键词
review; IDS; anomaly; taxonomy; machine learning; future directions; INTELLIGENCE;
D O I
10.23919/NTSP61680.2024.10726305
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the field of intrusion detection, research has made enormous progress over the past decade, and there are many articles devoted to this issue. Currently, however, intrusion detection covers a very wide spectrum of new technologies, and mapping this area, current trends and open problems could greatly help researchers find their way and choose the path to take. There are also many different reviews and studies in this domain, which provide different taxonomy and categorization for the same terms what is causing confusion, especially for new researchers in this domain. The article is providing comprehensive overview of different Intrusion Detection System (IDS) methodologies, techniques and taxonomy. Also, the most important principles are described so that the reader, after reading it, clearly understands what IDS is and what its different categories are, how it works. A big emphasis is placed on various open problems for future research.
引用
收藏
页码:105 / 112
页数:8
相关论文
共 34 条
[11]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[12]  
Cleghorn L., 2013, Journal of Information Security, V4, P144, DOI [10.4236/jis.2013.43017., DOI 10.4236/JIS.2013.43017]
[13]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[14]   A survey of neural networks usage for intrusion detection systems [J].
Drewek-Ossowicka, Anna ;
Pietrolaj, Mariusz ;
Ruminski, Jacek .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) :497-514
[15]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
[16]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[17]   Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things [J].
Ghimire, Bimal ;
Rawat, Danda B. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :8229-8249
[18]   Cyber-Physical Systems Security-A Survey [J].
Humayed, Abdulmalik ;
Lin, Jingqiang ;
Li, Fengjun ;
Luo, Bo .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1802-1831
[19]   A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges [J].
Khraisat, Ansam ;
Alazab, Ammar .
CYBERSECURITY, 2021, 4 (01)
[20]   Survey of intrusion detection systems: techniques, datasets and challenges [J].
Khraisat, Ansam ;
Gondal, Iqbal ;
Vamplew, Peter ;
Kamruzzaman, Joarder .
CYBERSECURITY, 2019, 2 (01)