A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets

06/09/2018
by   Hanan Hindy, et al.
0

With the world moving towards being increasingly dependent on computers and automation, one of the main challenges in the current decade has been to build secure applications, systems and networks. Alongside these challenges, the number of threats is rising exponentially due to the attack surface increasing through numerous interfaces offered for each service. To alleviate the impact of these threats, researchers have proposed numerous solutions; however, current tools often fail to adapt to ever-changing architectures, associated threats and 0-days. This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets. These taxonomies and surveys aim to improve both the efficiency of IDS and the creation of datasets to build the next generation IDS as well as to reflect networks threats more accurately in future datasets. To this end, this manuscript also provides a taxonomy and survey or network threats and associated tools. The manuscript highlights that current IDS only cover 25 demonstrate clear lack of real-network threats and attack representation, but rather include a large number of deprecated threats, hence limiting the accuracy of current machine learning IDS. Moreover, the taxonomies are open-sourced to allow public contributions through a Github repository.

READ FULL TEXT

page 21

page 22

page 23

page 28

research
06/09/2018

A Taxonomy of Malicious Traffic for Intrusion Detection Systems

With the increasing number of network threats it is essential to have a ...
research
07/22/2020

Evaluation of Network Based IDS and Deployment of multi-sensor IDS

Cloud-based and network-based technology has witnessed an exponential ri...
research
01/19/2018

Plagiarism: Taxonomy, Tools and Detection Techniques

To detect plagiarism of any form, it is essential to have broad knowledg...
research
09/15/2020

Data-Driven Network Intrusion Detection: A Taxonomy of Challenges and Methods

Data-driven methods have been widely used in network intrusion detection...
research
01/18/2023

Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures

A thorough and systematic understanding of different elements of cyberat...
research
04/08/2021

Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

Deception technology has proven to be a sound approach against threats t...
research
01/08/2018

A Novel Framework for DDoS Detectionin Huge Scale Networks, Thanksto QoS Features

It is not been a long time since the advent of cloud-based technology. H...

Please sign up or login with your details

Forgot password? Click here to reset