[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A Survey on Intrusion Detection and Prevention Systems

Published: 10 June 2023 Publication History

Abstract

In the digital world, malicious activities that violate the confidentiality, integrity, or availability of data and devices are known as intrusions. An intrusion detection system (IDS) analyses the activities of a single system or a network to identify intrusions. It alerts the system administrators about the detected intrusions and makes them responsible for restoring the affected system(s). To automatically handle intrusions, an IDS is integrated with a response component, and the combined system is known as an intrusion detection and response system (IDRS). An IDRS forms a reactive pair that detects and responds to intrusions affecting the system(s). To prevent the occurrence of intrusions proactively, an intrusion prevention system (IPS) is deployed with an IDRS. Intrusion prevention and detection system (IPDS) forms a strong line of defense against malicious attempts that try to violate the privacy and security of the monitored device(s). This paper is an up-to-date survey of 113 research articles published in the area of IPSs, IDSs, and IDRSs in the past 7 years. It provides several insights into the literature, highlighting various future research areas. It describes the characteristics, merits, and demerits of different types of IPSs, IDSs, and IDRSs, that are a pre-requisite for developing efficient IPDSs. The foundations of the three systems and the description of their complementary functionalities as a combined system are also explained in this paper. To the best of our knowledge, there exist survey papers that focus on IPS, IDS, and IDRS separately, but not all three systems together. This paper explains the interconnected roles of IPS, IDS, and IDRS to develop an IPDS.

References

[1]
Aburomman A and Reaz MB A survey of intrusion detection systems based on ensemble and hybrid classifiers Comput Secur 2017 65 135-152
[2]
Ahmed M, Mahmood AN, and Hu J A survey of network anomaly detection techniques J Netw Comput Appl 2016 60 19-31
[3]
Al-Yaseen WL, Othman ZA, and Nazri MZ Real-time multi-agent system for an adaptive intrusion detection system Pattern Recognit Lett 2017 85 56-64
[4]
Anantvalee T, Wu J. A survey on intrusion detection in mobile ad hoc networks. In: Wireless network security. signals and communication technology. Boston: Springer; 2007. p. 159–180.
[5]
Anusha K and Sathiyamoorthy E Comparative study for feature selection algorithms in intrusion detection system Autom Control Comput Sci 2016 50 1 1-9
[6]
Anwar S, Zain JM, Zolkipli MF, Inayat Z, Jabir AN, Odili JB. Response option for attacks detected by intrusion detection system. In: 2015 4th international conference on software engineering and computer systems (ICSECS). Kuantan: IEEE; 2015. p. 195–200.
[7]
Anwar S, Zain JM, Zolkipli MF, Inayat Z, Khan S, Anthony B, and Chang V From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions Algorithms 2017 10 2 1-24
[8]
Ayo FE, Folorunso SO, Abayomi-Alli AA, Adekunle AO, and Awotunde JB Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection Inf Secur J Glob Perspect 2020 29 6 267-283
[9]
Bachl M, Meghdouri F, Fabini J, Zseby T. SparseIDS: learning packet sampling with reinforcement learning. arXiv:2002.03872. 2020. p. 1–9.
[10]
Bedi P, Gupta N, Jindal V. Siam-IDS: handling class imbalance problem in intrusion detection systems using siamese neural network. In: Presented in third international conference on computing and network communications, Trivandrum. 2019.
[11]
Bedi P, Gupta N, and Jindal V I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems Appl Intell 2020 51 2021 1133-1151
[12]
Bejoy B, Subbiah J. Artificial immune system based intrusion detection system—a comprehensive review. Int J Comput Eng Technol. 2017;8(1):85–95. http://www.iaeme.com/MasterAdmin/Journal_uploads/IJCET/VOLUME_8_ISSUE_1/IJCET_08_01_010.pdf.
[13]
Berenjian S, Shajari M, Farshid N, Hatamian M. Intelligent automated intrusion response system based on fuzzy decision making and risk assessment. In: 2016 IEEE 8th international conference on intelligent systems (IS). Sofia: IEEE; 2016. p. 709–714.
[14]
Bijone M A survey on secure network: intrusion detection & prevention approaches Am J Inf Syst 2016 4 3 69-88
[15]
Biswas SK. Intrusion detection using machine learning: a comparison study. Special Issue in Int J Pure Appl Math (IJPAM). 2018;118(19):101–114. https://acadpubl.eu/jsi/2018-118-19/articles/19a/8.pdf.
[16]
Blanco R, Cilla JJ, Briongos S, Malagón P, Moya JM. Applying cost-sensitive classifiers with reinforcement learning to IDS. In: Intelligent data engineering and automated learning—IDEAL 2018. Madrid: Springer; 2018. p. 531–538.
[17]
Buczak AL and Guven E A survey of data mining and machine learning methods for cyber security intrusion detection IEEE Commun Surv Tutor 2016 18 2 1153-1176
[18]
Bul’ajoul W, James A, and Shaikh S A new architecture for network intrusion and prevention IEEE Access 2019 7 18558-18573
[19]
Chalapathy R, Chawla S. Deep learning for anomaly detection: a survey. arXiv:1901.03407. 2019. p. 1–50.
[20]
Chandra A, Khatri SK, Simon R. Filter-based attribute selection approach for intrusion detection using k-means clustering and sequential minimal optimization technique. In: 2019 amity international conference on artificial intelligence (AICAI). Dubai: IEEE; 2019. p. 740–745.
[21]
Chapaneri R, Shah S. Comprehensive survey of machine learning-based network intrusion detection. In: smart intelligent computing and applications. Singapore: Springer; 2019. p. 345–356.
[22]
Chellam A, Ramanathan L, and Surbhi R Intrusion detection in computer networks using lazy learning algorithm Proc Comput Sci 2018 132 928-936
[23]
Chowdhury MU, Hammond F, Konowicz G, Xin C, Wu H, Li J. A few-shot deep learning approach for improved intrusion detection. In: 2017 IEEE 8th annual ubiquitous computing, electronics and mobile communication conference (UEMCON). New York: IEEE; 2017. p. 456–462.
[24]
Cui W, Lu Q, Qureshi AM, Li W, and Wu K An adaptive LeNet-5 model for anomaly detection Inf Secur J Glob Perspect 2021 30 1 19-29
[25]
Das R, Morris TH. Machine learning and cyber security. In: 2017 international conference on computer, electrical & communication engineering (ICCECE). Kolkata: IEEE; 2017. p. 1–7.
[26]
Denning DE An intrusion-detection model IEEE Trans Softw Eng 1987 13 2 222-232
[27]
Deore B and Bhosale S Intrusion detection system based on RNN classifier for feature reduction SN Comput Sci 2022 3 1-9
[28]
Domingues R, Michiardi P, Barlet J, and Filippone M A comparative evaluation of novelty detection algorithms for discrete sequences Artif Intell Rev 2020 53 3787-3812
[29]
Duppa GI and Surantha N Evaluation of network security based on next generation intrusion prevention system Telkomnika 2019 17 1 39-48
[30]
Enache A-C, Sgârciu V, Togan M. Comparative study on feature selection methods rooted in swarm intelligence for intrusion detection. In: 2017 21st international conference on control systems and computer science (CSCS). Bucharest: IEEE; 2017. p. 239–244.
[31]
Farhaoui Y Design and implementation of an intrusion prevention system Int J Netw Secur 2017 19 5 675-683
[32]
Fernandes DA, Freire MM, Fazendeiro PA, and Inácio PR Applications of artificial immune systems to computer security: a survey J Inf Secur Appl 2017 35 138-159
[33]
Folino G and Sabatino P Ensemble based collaborative and distributed intrusion detection systems: a survey J Netw Comput Appl 2016 66 1-16
[34]
GhasemiGol M, Takabi H, and Ghaemi-Bafghi A A foresight model for intrusion response management Comput Secur 2016 62 73-94
[35]
Glass-Vanderlan TR, Iannacone MD, Vincent MS, Chen Q, Bridges RA. A survey of intrusion detection systems leveraging host data. arXiv:1805.06070 [cs.CR]. 2018. p. 1–40.
[36]
Gupta A and Sharma LS Detecting attacks in high-speed networks: Issues and solutions Inf Secur J Glob Perspect 2020 29 2 51-61
[37]
Gupta N, Bedi P, Jindal V. Effect of activation functions on the performance of deep learning algorithms for network intrusion detection systems. In: International conference on emerging trends in information technology (ICETIT-2019). Delhi: Springer; 2019. p. 1–12.
[38]
Gupta N, Jindal V, and Bedi P LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system Comput Netw 2021 192
[39]
Gupta N, Jindal V, and Bedi P CSE-IDS: using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems Comput Secur 2022 112
[40]
Halim Z, Yousaf MN, Waqas M, Sulaiman M, Abbas G, Hussain M, and Hanif M An effective genetic algorithm-based feature selection method for intrusion detection systems Comput Secur 2021 110
[41]
Hamed T, Ernst JB, Kremer SC. A survey and taxonomy of classifiers of intrusion detection systems. In: Computer and network security essentials. Cham: Springer; 2018. p. 21–39.
[42]
Hamed T, Ernst JB, Kremer SC. A survey and taxonomy on data and pre-processing techniques of intrusion detection systems. In: Computer and network security essentials. Cham: Springer; 2018. p. 113–134.
[43]
Handa A, Sharma A, and Shukla SK Machine learning in cybersecurity: a review Wiley Interdiscip Rev Data Min Knowl Discov 2019 9 4 1-7
[44]
Haq NF, Onik AR, Hridoy MK, Rafni M, Shah FM, and Farid MD Application of machine learning approaches in intrusion detection system: a survey IJARAI Int J Adv Res Artif Intell 2015 4 3 9-18
[45]
Hasegawa H, Yamaguchi Y, Shimada H, Takakura H. An incident response support system based on seriousness of infection. In: 2016 international conference on information networking (ICOIN). Kota Kinabalu: IEEE; 2016. p. 69–74.
[46]
Hindy H, Brosset D, Bayne E, Seeam AK, Tachtatzis C, Atkinson R, and Bellekens X A taxonomy of network threats and the effect of current datasets on intrusion detection systems IEEE Access 2020 8 104650-104675
[47]
Hindy H, Brosset D, Bayne E, Seeam A, Tachtatzis C, Atkinson R, Bellekens X. A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. 2018;1(1), 1–35. arXiv:1806.03517v1 [cs.CR].
[48]
Hindy H, Hodo E, Bayne E, Seeam A, Atkinson R, Bellekens X. A taxonomy of malicious traffic for intrusion detection systems. In: 2018 international conference on cyber situational awareness, data analytics and assessment (Cyber SA). Glasgow: IEEE; 2018. p. 1–4.
[49]
Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R. Shallow and deep networks intrusion detection system: a taxonomy and survey. 2017. arXiv:1701.02145.
[50]
Hofmeyr SA. Affinity maturation. 1997. https://www.cs.unm.edu/~immsec/html-imm/affmat.html. Accessed 17 June 2019.
[51]
Iannucci S and Abdelwahed S Model-based response planning strategies for autonomic intrusion protection ACM Trans Auton Adapt Syst (TAAS). 2018 13 1 1-23
[52]
Iannucci S, Chen Q, Abdelwahed S. High-performance intrusion response planning on many-core architectures. In: 2016 25th international conference on computer communication and networks (ICCCN). Waikoloa: IEEE; 2016. p. 1–6.
[53]
Inayat Z, Gani A, Anuar NB, Khan MK, and Anwar S Intrusion response systems: foundations, design, and challenges J Netw Comput Appl 2016 62 53-74
[54]
Injadat MN, Moubayed A, Nassif AB, and Shami A Machine learning towards intelligent systems: applications, challenges, and opportunities Artif Intell Rev 2021 54 3299-3348
[55]
Jose S, Malathi D, Reddy B, and Jayaseeli D A survey on anomaly based host intrusion detection system J Phys Conf Ser 2018 1000 1-10
[56]
Vigneswaran R, Poornachandran P, Soman KP. A compendium on network and host based intrusion detection systems (ICDSMLA). In: International conference on data science, machine learning & applications. Hyderabad: Springer; 2019. p. 1–8.
[57]
Kenkre PS, Pai A, Colaco L. Real time intrusion detection and prevention system. In: Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (FICTA) 2014. Bhubaneswar, Odisha, India: Springer, Cham; 2015. p. 405–411.
[58]
Khan MA, Karim MR, and Kim Y A scalable and hybrid intrusion detection system based on the convolutional-LSTM network Symmetry 2019 11 4 583
[59]
Kim K, Aminanto ME, Tanuwidjaja HC. Classical machine learning and its applications to IDS. In: Network intrusion detection using deep learning. Part of the springerbriefs on cyber security systems and networks book series (BRIEFSCSSN). Singapore: Springer; 2018. p. 13–26.
[60]
Kwon D, Kim H, Kim J, Suh SC, Kim I, and Kim KJ A survey of deep learning-based network anomaly detection Clust Comput 2019 22 949-961
[61]
Latha S, Prakash SJ. A survey on network attacks and intrusion detection systems. In: 2017 4th international conference on advanced computing and communication systems (ICACCS). Coimbatore: IEEE; 2017. p. 1–7.
[62]
Lee B, Amaresh S, Green C, Engels D. Comparative study of deep learning models for network intrusion detection. SMU Data Sci Rev 2018;1(1):1–13. https://scholar.smu.edu/datasciencereview.
[63]
Li C, Wang J, and Ye X Using a recurrent neural network and restricted boltzmann machines for malicious traffic detection NeuroQuantology 2018 16 5 823-831
[64]
Li F, Xiong F, Li C, Yin L, Shi G, Tian B. SRAM: a state-aware risk assessment model for intrusion response. In: 2017 IEEE second international conference on data science in cyberspace (DSC). Shenzhen: IEEE; 2017. p. 232–237.
[65]
Li Z, Rios AL, Xu G, Trajković L. Machine learning techniques for classifying network anomalies and intrusions. In: 2019 IEEE international symposium on circuits and systems (ISCAS). Sapporo: IEEE; 2019. p. 1–5.
[66]
Liu M, Xue Z, Xu X, Zhong C, and Chen J Host-based intrusion detection system with system calls: review and future trends ACM Comput Surv (CSUR) 2018 51 5 98
[67]
Lopes A, Hutchison A. Experimenting with machine learning in automated intrusion response. In: International symposium on intelligent and distributed computing. Petersburg: Springer; 2019. p. 505–514.
[68]
Lopez-Martin M, Carro B, and Sanchez-Esguevillas A Application of deep reinforcement learning to intrusion detection for supervised problems Expert Syst Appl 2020 141
[69]
Makani R, Reddy B. Taxonomy of machine leaning based anomaly detection and its suitability. In: International conference on computational intelligence and data science (ICCIDS 2018), vol 132. Procedia Computer Science, Elsevier. 2018. p. 1842–1849.
[70]
Milan SH, Singh K. Reducing false alarms in intrusion detection systems—a survey. Int Res J Eng Technol (IRJET). 2018;5(2):9–12. https://www.irjet.net/archives/V5/i2/IRJET-V5I203.pdf.
[71]
Milenkoski A, Vieira M, Kounev S, Avritzer A, and Payne BD Evaluating computer intrusion detection systems: a survey of common practices ACM Comput Surv 2015 48 1 1-41
[72]
Min E, Long J, Liu Q, Cui J, and Chen W TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest Secur Commun Netw 2018 2018 1-9
[73]
Mishra P, Varadharajan V, Tupakula U, and Pilli ES A detailed investigation and analysis of using machine learning techniques for intrusion detection IEEE Commun Surv Tutor 2018 21 1 686-728
[74]
Mishra S, Sagban R, Yakoob A, and Gandhi N Swarm intelligence in anomaly detection systems: an overview Int J Comput Appl 2018 43 1-10
[75]
Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, and Karimipour H Cyber intrusion detection by combined feature selection algorithm J Inf Secur Appl 2019 44 80-88
[76]
Moustafa N, Hu J, and Slay J A holistic review of network anomaly detection systems: a comprehensive survey J Netw Comput Appl 2019 128 33-55
[77]
Naseer S and Mahmood R Intrusion detection techniques in mobile adhoc networks: a review Lect Notes Inf Theory 2015 3 1 52-55
[78]
Neelima D, Karthik J, John KA, Gowthami S, Nayak J. Soft computing-based intrusion detection approaches: an analytical study. In: Soft computing in data analytics. Advances in intelligent systems and computing, vol 758. Singapore: Springer; 2019. p. 635–651.
[79]
Nejat SK and Kabiri P An adaptive and cost-based intrusion response system Cybern Syst 2017 48 6–7 495-509
[80]
Ortuño SY, Aguilar JA, Taboada B, Ortiz CA, Ramírez MP, Figueroa GA. The use of artificial intelligence for the intrusion detection system in computer networks. In: Mexican international conference on artificial intelligence. Cham: Springer; 2019. p. 302–312.
[81]
Patel A, Qassim Q, and Wills C A survey of intrusion detection and prevention systems Inf Manag Comput Secur 2010 18 4 277-290
[82]
Peng J, Choo K-KR, and Ashman H User profiling in intrusion detection: a review J Netw Comput Appl 2016 72 14-27
[83]
Probst P, Wright MN, and Boulesteix A-L Hyperparameters and tuning strategies for random forest Wiley Interdiscip Rev Data Min Knowl Discov 2019 9 3 1-15
[84]
Ramaki AA, Rasoolzadegan A, and Bafghi AG A systematic mapping study on intrusion alert analysis in intrusion detection systems ACM Comput Surv (CSUR) 2018 51 3 1-41
[85]
Rani M, Gagandeep. A review of intrusion detection system in cloud computing. In: Proceedings of international conference on sustainable computing in science, technology and management (SUSCOM). Jaipur. 2019. p. 770–776.
[86]
Resende PA and Drummond AC A survey of random forest based methods for intrusion detection systems ACM Comput Surv (CSUR) 2018 51 3 48
[87]
Ring M, Wunderlich S, Scheuring D, Landes D, and Hotho A A survey of network-based intrusion detection data sets Comput Secur 2019 86 2019 147-167
[88]
Rizvi S, Labrador G, Guyan M, and Savan J Advocating for hybrid intrusion detection prevention system and framework improvement Proc Comput Sci 2016 95 369-374
[89]
Saleh AI, Fatma FM, and Labib LM A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers Artif Intell Rev 2019 51 403-443
[90]
Salo F, Nassif AB, and Essex A Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection Comput Netw 2019 148 164-175
[91]
Sánchez JF, Parra OJ, Sánchez LC. A game theory approach for intrusion prevention systems. Applied computer sciences in engineering. WEA 2018, vol 915. p. 218–229. Medellín: Springer; 2018.
[92]
Sandhu UA, Haider S, Naseer S, Ateeb OU. A survey of intrusion detection & prevention techniques. In: 2011 international conference on information communication and management. Singapore: IACSIT Press; 2011. p. 66–71.
[93]
Sarıkaya A and Kılıç BG A class-specific intrusion detection model: hierarchical multi-class ids model SN Comput Sci 2020 1 1-11
[94]
Sarker IH Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective SN Comput Sci 2021 2 1-16
[95]
Saurabh P and Verma B An efficient proactive artificial immune system based anomaly detection and prevention system Expert Syst Appl 2016 60 311-320
[96]
Sawant A. A comparative study of different intrusion prevention systems. In: 2018 fourth international conference on computing communication control and automation (ICCUBEA). Pune: IEEE; 2018. p. 1–5.
[97]
Sekhar R, Perumal K, and Rani SV Analysis of next generation intrusion prevention system using sensor fusion and fuzzy logic Int J Sci Res Eng Technol (IJSRET) 2015 4 9 936-938
[98]
Sen S. A survey of intrusion detection systems using evolutionary computation. In: Bio-inspired computation in telecommunications. Morgan Kaufmann; 2015. p. 73–94.
[99]
Shameli-Sendi A, Ezzati-jivan N, Jabbarifar M, Dagenais M. Intrusion response systems: survey and taxonomy. Int J Comput Sci Netw Secur. 2012;12(1):1–14. https://www.researchgate.net/profile/Alireza_Shameli-Sendi/publication/267917501_Intrusion_Response_Systems_Survey_and_Taxonomy/links/54da21270cf2970e4e7dc67c.pdf.
[100]
Sharma RK, Issac B, and Kalita HK Intrusion detection and response system inspired by the defense mechanism of plants IEEE Access 2019 7 52427-52439
[101]
Shiravi A, Shiravi H, and Tavallaee M Toward developing a systematic approach to generate benchmark datasets for intrusion detection Comput Secur 2012 31 3 357-374
[102]
Shone N, Ngoc TN, Phai VD, and Shi Q A deep learning approach to network intrusion detection IEEE Trans Emerg Top Comput Intell 2018 2 1 41-50
[103]
Siregar B, Purba RF, Seniman, Fahmi F. Intrusion prevention system against denial of service attacks using genetic algorithm. In: 2018 IEEE international conference on communication, networks and satellite (Comnetsat). Medan: IEEE; 2018. p. 55–59.
[104]
Solomon IA, Jatain A, Bajaj SB. Neural network based intrusion detection: state of the art. In: Proceedings of international conference on sustainable computing in science, technology and management (SUSCOM). Jaipur: Elsevier SSRN; 2019. p. 1390–1396.
[105]
Stakhanova N, Basu S, Wong JS. A taxonomy of intrusion response systems. Iowa State University. 2006.
[106]
Strasburg C, Stakhanova N, Basu S, Wong JS. Intrusion response cost assessment methodology. In: ASIACCS '09: proceedings of the 4th international symposium on information, computer, and communications security. Sydney: ACM, New York; 2009. p. 388–391.
[107]
Suliman SI, Shukor MS, Kassim M, Mohamad R, Shahbudin S. Network intrusion detection system using artificial immune system (AIS). In: 2018 3rd international conference on computer and communication systems (ICCCS). Nagoya: IEEE; 2018. p. 178–182.
[108]
Tabatabaefar M, Miriestahbanati M, Grégoire J-C. Network intrusion detection through artificial immune system. In: 2017 annual IEEE international systems conference (SysCon). Montreal: IEEE; 2017. p. 1–6.
[109]
Thakkar A and Lohiya R A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions Artif Intell Rev 2021
[110]
Timmis J. Basic immune inspired algorithms. Retrieved from AISWeb The Online Home of Artificial Immune Systems. 2013. http://www.artificial-immune-systems.org/.
[111]
Tu S, Waqas M, Rehman SU, Mir T, Abbas G, Abbas ZH, and Ahmad I Reinforcement learning assisted impersonation attack detection in device-to-device communications IEEE Trans Veh Technol 2021 70 2 1474-1479
[112]
Ugochukwu CJ, Bennett EO. An intrusion detection system using machine learning algorithm. Int J Comput Sci Math Theory. 2018;4(1):39–47. https://www.iiardpub.org/get/IJCSMT/VOL.%204%20NO.%201%202018/An%20Intrusion%20Detection.pdf.
[113]
Varma PK, Kumari VV, Kumar SS. A survey of feature selection techniques in intrusion detection system: a soft computing perspective. In: Progress in computing, analytics and networking. Advances in intelligent systems and computing. 2018;710:785–793. Bhubaneshwar: Springer, Singapore.
[114]
Vasudeo SH, Patil P, Kumar RV. IMMIX-intrusion detection and prevention system. In: 2015 international conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM). Chennai: IEEE; 2015. p. 96–101.
[115]
Vidal JM, Orozco AL, and Villalba LJ Adaptive artificial immune networks for mitigating DoS flooding attacks Swarm Evolut Comput 2018 38 94-108
[116]
Vieira K, Koch FL, Sobral JB, Westphall CB, and Leão JL Autonomic intrusion detection and response using big data IEEE Syst J 2019
[117]
Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, and Venkatraman S Deep learning approach for intelligent intrusion detection system IEEE Access 2019 7 41525-41550
[118]
Wei X. Design and implementation of a lightweight intrusion detection and prevention system. In: International conference on security and privacy in new computing environments. Cham: Springer; 2019. p. 433–439.
[119]
Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, and Wang C Machine learning and deep learning methods for cybersecurity IEEE Access 2018 6 35365-35381
[120]
Yang J-N, Zhang H-Q, Zhang C-F. Intrusion response decision-making method based on reinforcement learning. In: 2018 international conference on communication, network and artificial intelligence (CNAI 2018). Beijing. 2018. p. 1–9.
[121]
Zheng L, Yuan H, Peng X, Zhu G, Guo Y, Xu H, Deng G. Research on distributed high speed network intrusion prevention system. In: Cyber security intelligence and analytics. CSIA 2019. Advances in intelligent systems and computing. Shenyang: Springer, Cham; 2020. p. 1118–1126.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image SN Computer Science
SN Computer Science  Volume 4, Issue 5
Jun 2023
3596 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 10 June 2023
Accepted: 18 May 2023
Received: 06 April 2022

Author Tags

  1. Intrusions
  2. Intrusion prevention system (IPS)
  3. Intrusion detection system (IDS)
  4. Intrusion detection and response system (IDRS)
  5. Intrusion prevention and detection system (IPDS)

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media