Authors :
P. M. N. V. V. Sarveswara Gupta; B. Venkateswarlu; S. Karthikeya; Dr. Mohan Kumar Chandol; V. G. Sai Sumanth
Volume/Issue :
Volume 9 - 2024, Issue 6 - June
Google Scholar :
https://shorturl.at/2vd5z
Scribd :
https://shorturl.at/ALbDR
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUN2043
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
It is crucial to secure digital assets and
networks against harmful activity in the linked world of
today. Through the detection and mitigation of
unauthorized access, malicious activity, and possible
security threats, Intrusion Detection and Prevention
Systems (IDPS) are essential to the protection of systems
and networks. The development, approaches,
technologies, difficulties, and future directions of
intrusion detection and prevention systems are all covered
in detail in this research paper. The study examines the
advantages and disadvantages of several IDPS
methodologies, such as hybrid, anomaly-based, and
signature-based techniques. It also addresses how to
improve the efficacy and efficiency of IDPS using cutting-
edge methods like big data analytics, artificial
intelligence, and machine learning. In addition, the study
discusses and suggests possible solutions for the problems
that IDPS faces, including false positives, evasion
strategies, and scalability concerns. In order to assist
academics, researchers, and practitioners with insights, it
concludes by outlining future directions for study and
development in the field of intrusion detection and
prevention systems.
Keywords :
Intrusion Detection and Prevention Systems, IDPS, Signature-based, Anomaly-based, Machine Learning, Artificial Intelligence, Big Data Analytics.
References :
- Anderson, D. (2019). Intrusion Detection and Prevention Systems: Concepts and Techniques (Advances in Information Security, Privacy, and Ethics). IGI Global.
- Kent, K. (2018). Network Intrusion Detection and Prevention: Concepts and Techniques. Springer.
- A. Gendreau and M. Moorman, “Survey of intrusion detection systems towards an end to end secure internet of things,” in Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud (FiCloud '16), pp. 84–90, IEEE Computer, Vienna, Austria, August 2016.
- M. Ammar, G. Russello, and B. Crispo, “Internet of Things: a survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018.
- F. Restuccia, S. D'Oro, and T. Melodia, “Securing the internet of things in the age of machine learning and software-defined networking,” IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4829–4842, 2018.
- Roesch, M. (1999). Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX Conference on System Administration (Vol. 13, pp. 229-238).
- Shin, S., Gu, G., Porras, P., Yegneswaran, V., & Fong, M. (2011). Avant-Guard: Scalable and Vigilant Switch Flow Management in Software-Defined Networks. In Proceedings of the 2011 ACM SIGCOMM Conference (pp. 408-409).
- Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). Alert Verification in Intrusion Detection Systems. ACM Transactions on Information and System Security, 7(4), 585-615.
- Moore, A. W., & Edsall, T. (2003). A Social Network Analysis of IRC Botnets. In Proceedings of the 3rd Usenix Steps to Reducing Unwanted Traffic on the Internet Workshop (pp. 91-98).
- Ud Din, M. Guizani, B. Kim, S. Hassan, and M. Khurram Khan, “Trust management techniques for the internet of things: a survey,” IEEE Access, vol. 7, pp. 29763–29787, 2019.
- Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, “A global hybrid intrusion detection system for wireless sensor networks,” Procedia Computer Science, vol. 52, pp. 1047–1052, 2015.
- S. M. Sajjad, S. H. Bouk, and M. Yousaf, “Neighbor node trust based intrusion detection system for WSN,” Procedia Computer Science, vol. 63, pp. 183–188, 2015.
- E. M. Shakshuki, N. Kang, and T. R. Sheltami, “EAACK — a secure intrusion-detection system for MANETs,” IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1089–1098, 2013.
- J. Bhar, “A mac protocol implementation for wireless sensor network,” Journal of Computer Networks and Communications, vol. 2015, no. 1, 2015.
- Jung, J., & McHugh, J. (2001). Enhancing the Accuracy of Network-based Intrusion Detection with Host-based Context. In Proceedings of the 10th USENIX Security Symposium (Vol. 10, pp. 207-220).
- Pfleeger, C. P., & Pfleeger, S. L. (2002). Security in Computing (3rd ed.). Prentice Hall.
- Mirkovic, J., & Reiher, P. (2004). A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39-53.
- Dittrich, D., & Kennington, J. (2001). Threats and Vulnerabilities in Distributed Systems. IEEE Security & Privacy, 1(6), 66-73.
It is crucial to secure digital assets and
networks against harmful activity in the linked world of
today. Through the detection and mitigation of
unauthorized access, malicious activity, and possible
security threats, Intrusion Detection and Prevention
Systems (IDPS) are essential to the protection of systems
and networks. The development, approaches,
technologies, difficulties, and future directions of
intrusion detection and prevention systems are all covered
in detail in this research paper. The study examines the
advantages and disadvantages of several IDPS
methodologies, such as hybrid, anomaly-based, and
signature-based techniques. It also addresses how to
improve the efficacy and efficiency of IDPS using cutting-
edge methods like big data analytics, artificial
intelligence, and machine learning. In addition, the study
discusses and suggests possible solutions for the problems
that IDPS faces, including false positives, evasion
strategies, and scalability concerns. In order to assist
academics, researchers, and practitioners with insights, it
concludes by outlining future directions for study and
development in the field of intrusion detection and
prevention systems.
Keywords :
Intrusion Detection and Prevention Systems, IDPS, Signature-based, Anomaly-based, Machine Learning, Artificial Intelligence, Big Data Analytics.