Safeguarding Smart Horizons: Crafting the Future of IOT Security Through Intrusion Detection and Prevention


Authors : P. M. N. V. V. Sarveswara Gupta; B. Venkateswarlu; S. Karthikeya; Dr. Mohan Kumar Chandol; V. G. Sai Sumanth

Volume/Issue : Volume 9 - 2024, Issue 6 - June


Google Scholar : https://shorturl.at/2vd5z

Scribd : https://shorturl.at/ALbDR

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUN2043

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : It is crucial to secure digital assets and networks against harmful activity in the linked world of today. Through the detection and mitigation of unauthorized access, malicious activity, and possible security threats, Intrusion Detection and Prevention Systems (IDPS) are essential to the protection of systems and networks. The development, approaches, technologies, difficulties, and future directions of intrusion detection and prevention systems are all covered in detail in this research paper. The study examines the advantages and disadvantages of several IDPS methodologies, such as hybrid, anomaly-based, and signature-based techniques. It also addresses how to improve the efficacy and efficiency of IDPS using cutting- edge methods like big data analytics, artificial intelligence, and machine learning. In addition, the study discusses and suggests possible solutions for the problems that IDPS faces, including false positives, evasion strategies, and scalability concerns. In order to assist academics, researchers, and practitioners with insights, it concludes by outlining future directions for study and development in the field of intrusion detection and prevention systems.

Keywords : Intrusion Detection and Prevention Systems, IDPS, Signature-based, Anomaly-based, Machine Learning, Artificial Intelligence, Big Data Analytics.

References :

  1. Anderson, D. (2019). Intrusion Detection and Prevention Systems: Concepts and Techniques (Advances in Information Security, Privacy, and Ethics). IGI Global.
  2. Kent, K. (2018). Network Intrusion Detection and Prevention: Concepts and Techniques. Springer.
  3. A. Gendreau and M. Moorman, “Survey of intrusion detection systems towards an end to end secure internet of things,” in Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud (FiCloud '16), pp. 84–90, IEEE Computer, Vienna, Austria, August 2016.
  4. M. Ammar, G. Russello, and B. Crispo, “Internet of Things: a survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018.
  5. F. Restuccia, S. D'Oro, and T. Melodia, “Securing the internet of things in the age of machine learning and software-defined networking,” IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4829–4842, 2018.
  6. Roesch, M. (1999). Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX Conference on System Administration (Vol. 13, pp. 229-238).
  7. Shin, S., Gu, G., Porras, P., Yegneswaran, V., & Fong, M. (2011). Avant-Guard: Scalable and Vigilant Switch Flow Management in Software-Defined Networks. In Proceedings of the 2011 ACM SIGCOMM Conference (pp. 408-409).
  8. Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). Alert Verification in Intrusion Detection Systems. ACM Transactions on Information and System Security, 7(4), 585-615.
  9. Moore, A. W., & Edsall, T. (2003). A Social Network Analysis of IRC Botnets. In Proceedings of the 3rd Usenix Steps to Reducing Unwanted Traffic on the Internet Workshop (pp. 91-98).
  10. Ud Din, M. Guizani, B. Kim, S. Hassan, and M. Khurram Khan, “Trust management techniques for the internet of things: a survey,” IEEE Access, vol. 7, pp. 29763–29787, 2019.
  11. Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, “A global hybrid intrusion detection system for wireless sensor networks,” Procedia Computer Science, vol. 52, pp. 1047–1052, 2015.
  12. S. M. Sajjad, S. H. Bouk, and M. Yousaf, “Neighbor node trust based intrusion detection system for WSN,” Procedia Computer Science, vol. 63, pp. 183–188, 2015.
  13. E. M. Shakshuki, N. Kang, and T. R. Sheltami, “EAACK — a secure intrusion-detection system for MANETs,” IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1089–1098, 2013.
  14. J. Bhar, “A mac protocol implementation for wireless sensor network,” Journal of Computer Networks and Communications, vol. 2015, no. 1, 2015.
  15. Jung, J., & McHugh, J. (2001). Enhancing the Accuracy of Network-based Intrusion Detection with Host-based Context. In Proceedings of the 10th USENIX Security Symposium (Vol. 10, pp. 207-220).
  16. Pfleeger, C. P., & Pfleeger, S. L. (2002). Security in Computing (3rd ed.). Prentice Hall.
  17. Mirkovic, J., & Reiher, P. (2004). A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39-53.
  18. Dittrich, D., & Kennington, J. (2001). Threats and Vulnerabilities in Distributed Systems. IEEE Security & Privacy, 1(6), 66-73.

It is crucial to secure digital assets and networks against harmful activity in the linked world of today. Through the detection and mitigation of unauthorized access, malicious activity, and possible security threats, Intrusion Detection and Prevention Systems (IDPS) are essential to the protection of systems and networks. The development, approaches, technologies, difficulties, and future directions of intrusion detection and prevention systems are all covered in detail in this research paper. The study examines the advantages and disadvantages of several IDPS methodologies, such as hybrid, anomaly-based, and signature-based techniques. It also addresses how to improve the efficacy and efficiency of IDPS using cutting- edge methods like big data analytics, artificial intelligence, and machine learning. In addition, the study discusses and suggests possible solutions for the problems that IDPS faces, including false positives, evasion strategies, and scalability concerns. In order to assist academics, researchers, and practitioners with insights, it concludes by outlining future directions for study and development in the field of intrusion detection and prevention systems.

Keywords : Intrusion Detection and Prevention Systems, IDPS, Signature-based, Anomaly-based, Machine Learning, Artificial Intelligence, Big Data Analytics.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe