Securing Networks in the Digital Age: A Review of Intrusion Detection and Prevention Strategies


Authors : P.Hari Kishore; Sk.Muzubar Rahiman; P.Mahidhar; Mohan Kumar Chandol; T.Mahendra

Volume/Issue : Volume 9 - 2024, Issue 6 - June


Google Scholar : https://tinyurl.com/csfust6m

Scribd : https://tinyurl.com/2a6thcjp

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUN1878

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : In today's interconnected world, billions of individuals rely on the internet for various activities, from communication and commerce to entertainment and education. However, this widespread connectivity also brings about an increased risk of cyber threats and malicious activities. In response to these challenges, intrusion detection technology has emerged as a vital component of modern cybersecurity strategies. This paper presents a comprehensive literature survey focusing on Internal Intrusion Detection Systems (IIDS) and traditional Intrusion Detection Systems (IDS). These systems utilize a diverse array of data mining and forensic techniques algorithms to monitor and analyze system activities in real-time, thereby detecting and preventing potential security breaches. Additionally, the paper explores the integration of data mining methods for cyber analytics, offering valuable insights into the development and enhancement of intrusion detection capabilities. Through a thorough examination of existing research and methodologies, this study aims to provide a deeper understanding of the evolving landscape of intrusion detection and contribute to the advancement of cybersecurity practices in an increasingly digitized world.

Keywords : Internal Intrusion Detection System (IIDS), Intrusion Detection System (IDS), System Call (SC), Denial of Service (DOS).

References :

  1. Muneer, Salman, et al. "A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis." Journal of Engineering 2024.1 (2024): 3909173.
  2. He, Ke, Dan Dongseong Kim, and Muhammad Rizwan Asghar. "Adversarial machine learning for network intrusion detection systems: A comprehensive survey." IEEE Communications Surveys & Tutorials 25.1 (2023): 538-566.
  3. Lampe, Brooke, and Weizhi Meng. "Intrusion detection in the automotive domain: A comprehensive review." IEEE Communications Surveys & Tutorials (2023).
  4. Talukder, Md Alamin, et al. "A dependable hybrid machine learning model for network intrusion detection." Journal of Information Security and Applications 72 (2023): 103405.
  5. Qazi, Emad Ul Haq, Muhammad Hamza Faheem, and Tanveer Zia. "HDLNIDS: hybrid deep-learning-based network intrusion detection system." Applied Sciences 13.8 (2023): 4921.
  6. Kaur, Harmandeep, and Munish Kumar. "Signature identification and verification techniques: state-of-the-art work." Journal of Ambient Intelligence and Humanized Computing 14.2 (2023): 1027-1045.
  7. Asadi, Majid, Marzieh Hashemi, and Narayanaswamy Balakrishnan. "An overview of some classical models and discussion of the signature‐based models of preventive maintenance." Applied Stochastic Models in Business and Industry 39.1 (2023): 4-53.
  8. Cuchiero, Christa, Guido Gazzani, and Sara Svaluto-Ferro. "Signature-based models: Theory and calibration." SIAM journal on financial mathematics 14.3 (2023): 910-957.
  9. Bhavsar, Mansi, et al. "Anomaly-based intrusion detection system for IoT application." Discover Internet of Things 3.1 (2023): 5.
  10. Idrissi, Meryem Janati, et al. "Fed-anids: Federated learning for anomaly-based network intrusion detection systems." Expert Systems with Applications 234 (2023): 121000.
  11. Thanh, Nguyen Huu, et al. "On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks." Journal of Network and Systems Management 31.2 (2023): 43.
  12. Akhtar, Muhammad Shoaib, and Tao Feng. "Evaluation of machine learning algorithms for malware detection." Sensors 23.2 (2023): 946.
  13. Dey, Arun Kumar, Govind P. Gupta, and Satya Prakash Sahu. "Hybrid Meta-Heuristic based feature selection mechanism for cyber-attack detection in IoT-enabled networks." Procedia Computer Science 218 (2023): 318-327.
  14. Djenna, Amir, et al. "Artificial intelligence-based malware detection, analysis, and mitigation." Symmetry 15.3 (2023): 677.
  15. Kizza, Joseph Migga. "System intrusion detection and prevention." Guide to computer network security. Cham: Springer international publishing, 2024. 295-323.
  16. Omotunde, Habeeb, and Maryam Ahmed. "A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond." Mesopotamian Journal of CyberSecurity 2023 (2023): 115-133.
  17. Saviour, Mariya Princy Antony, and Dhandapani Samiappan. "IPFS based storage Authentication and access control model with optimization enabled deep learning for intrusion detection." Advances in Engineering Software 176 (2023): 103369.
  18. Javadpour, Amir, et al. "DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments." Cluster Computing 26.1 (2023): 367-384.
  19. Ahmadi, Sina. "Next Generation AI-Based Firewalls: A Comparative Study." International Journal of Computer (IJC) 49.1 (2023): 245-262.
  20. Bauböck, Rainer, and Julia Mourão Permoser. "Sanctuary, firewalls, regularisation: three inclusive responses to the presence of irregular migrants." Journal of Ethnic and Migration Studies 49.14 (2023): 3671-3688.
  21. Tian, Yue, et al. "Methodology for optimally designing firewalls in hydrogen refueling stations." International Journal of Hydrogen Energy 49 (2024): 1196-1209.
  22. Singh, Lakhvir, and Ram Singh. "Comparative Analysis of Traditional Firewalls and Next-Generation Firewalls: A Review." Latest Trends in Engineering and Technology: Proceedings of the 2nd International Conference on Latest Trends in Engineering and Technology (ICLTET 2023), July 13-14, 2023, Mohali, India. CRC Press, 2024.
  23. Benadjila, Ryad, and Arnaud Ebalard. "Randomness of random in Cisco ASA." Cryptology ePrint Archive (2023).
  24. Choi, Brendan, and Erwin Medina. "Creating IPSec Tunnels on Palo Alto Firewalls." Introduction to Ansible Network Automation: A Practical Primer. Berkeley, CA: Apress, 2023. 847-865.
  25. Singh, Monu, and Amit Kumar Singh. "A comprehensive survey on encryption techniques for digital images." Multimedia Tools and Applications 82.8 (2023): 11155-11187.
  26. Akinsanya, Michael Oladipo, Cynthia Chizoba Ekechi, and Chukwuekem David Okeke. "Virtual private networks (vpn): a conceptual review of security protocols and their application in modern networks." Engineering Science & Technology Journal 5.4 (2024): 1452-1472.
  27. Wang, Chunhua, et al. "High-dimensional memristive neural network and its application in commercial data encryption communication." Expert Systems with Applications 242 (2024): 122513.
  28. Koskinen, Jonne. "Cloud Security Architecture." (2023).
  29. Rivadeneira, Jorge Eduardo, et al. "User-centric privacy preserving models for a new era of the Internet of Things." Journal of Network and Computer Applications (2023): 103695.
  30. Anderson, Laura K. "Autistic experiences of applied behavior analysis." Autism 27.3 (2023): 737-750.
  31. Olabanji, Samuel Oladiipo, et al. "AI for Identity and Access Management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access control within cloud-based systems." Authorization, and Access Control within Cloud-Based Systems (January 25, 2024) (2024).
  32. Henriques, João, et al. "A forensics and compliance auditing framework for critical infrastructure protection." International Journal of Critical Infrastructure Protection 42 (2023): 100613.

In today's interconnected world, billions of individuals rely on the internet for various activities, from communication and commerce to entertainment and education. However, this widespread connectivity also brings about an increased risk of cyber threats and malicious activities. In response to these challenges, intrusion detection technology has emerged as a vital component of modern cybersecurity strategies. This paper presents a comprehensive literature survey focusing on Internal Intrusion Detection Systems (IIDS) and traditional Intrusion Detection Systems (IDS). These systems utilize a diverse array of data mining and forensic techniques algorithms to monitor and analyze system activities in real-time, thereby detecting and preventing potential security breaches. Additionally, the paper explores the integration of data mining methods for cyber analytics, offering valuable insights into the development and enhancement of intrusion detection capabilities. Through a thorough examination of existing research and methodologies, this study aims to provide a deeper understanding of the evolving landscape of intrusion detection and contribute to the advancement of cybersecurity practices in an increasingly digitized world.

Keywords : Internal Intrusion Detection System (IIDS), Intrusion Detection System (IDS), System Call (SC), Denial of Service (DOS).

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe