Intrusion Detection Systems: A Cross-Domain Overview

01/29/2020
by   LionelTidjon, et al.
0

The cybersecurity ecosystem continuously changes with the growth of cyber threats. Threat actors exploit different tactics, techniques, and procedures against the confidentiality, integrity, and availability of sensitive information. To protect the network perimeters, Intrusion Detection Systems (IDSs) allow taking defensive courses of actions by providing real-time, proactive and operational insights about cyber threat activities. They use different intrusion detection techniques to transform unbounded events into actionable information for counter-measures. These techniques are often limited when processing huge amounts of event streams. Event stream processing (ESP) approaches are potential solutions that leverage multiple event streams to provide a holistic view of network security postures and faster detection. In this context, the paper describes domains (including their vulnerabilities) on which recent work is based. The paper also surveys standards for vulnerability assessment and attack classification. Next, the paper provides a classification of IDSs, evaluation metrics, and datasets. The paper also presents the technical details of IDS and ESP approaches followed by an evaluation of recent work relying on these approaches. The evaluation covers different axes: domains, architectures, and local communication technologies. Finally, the paper discusses challenges and strategies to improve IDS in terms of accuracy, performance, and robustness.

READ FULL TEXT
research
02/18/2022

Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems

The increasing interaction of industrial control systems (ICSs) with pub...
research
04/19/2020

An overview of Intrusion Detection and Prevention Systems

Cyber threats are increasing not only in their volume but also in their ...
research
01/31/2019

A Holistic Approach to Evaluating Cyber Security Defensive Capabilities

Metrics and frameworks to quantifiably assess security measures have ari...
research
07/22/2020

Evaluation of Network Based IDS and Deployment of multi-sensor IDS

Cloud-based and network-based technology has witnessed an exponential ri...
research
11/26/2021

Graph-based Solutions with Residuals for Intrusion Detection: the Modified E-GraphSAGE and E-ResGAT Algorithms

The high volume of increasingly sophisticated cyber threats is drawing g...
research
12/29/2019

Cyber Situation Awareness with Active Learning for Intrusion Detection

Intrusion detection has focused primarily on detecting cyberattacks at t...
research
05/08/2023

A Survey on AI/ML-Driven Intrusion and Misbehavior Detection in Networked Autonomous Systems: Techniques, Challenges and Opportunities

AI/ML-based intrusion detection systems (IDSs) and misbehavior detection...

Please sign up or login with your details

Forgot password? Click here to reset