Authors :
P.Hari Kishore; Sk.Muzubar Rahiman; P.Mahidhar; Mohan Kumar Chandol; T.Mahendra
Volume/Issue :
Volume 9 - 2024, Issue 6 - June
Google Scholar :
https://tinyurl.com/csfust6m
Scribd :
https://tinyurl.com/2a6thcjp
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUN1878
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
In today's interconnected world, billions of
individuals rely on the internet for various activities,
from communication and commerce to entertainment and
education. However, this widespread connectivity also
brings about an increased risk of cyber threats and
malicious activities. In response to these challenges,
intrusion detection technology has emerged as a vital
component of modern cybersecurity strategies. This
paper presents a comprehensive literature survey
focusing on Internal Intrusion Detection Systems (IIDS)
and traditional Intrusion Detection Systems (IDS). These
systems utilize a diverse array of data mining and
forensic techniques algorithms to monitor and analyze
system activities in real-time, thereby detecting and
preventing potential security breaches. Additionally, the
paper explores the integration of data mining methods for
cyber analytics, offering valuable insights into the
development and enhancement of intrusion detection
capabilities. Through a thorough examination of existing
research and methodologies, this study aims to provide a
deeper understanding of the evolving landscape of
intrusion detection and contribute to the advancement of
cybersecurity practices in an increasingly digitized world.
Keywords :
Internal Intrusion Detection System (IIDS), Intrusion Detection System (IDS), System Call (SC), Denial of Service (DOS).
References :
- Muneer, Salman, et al. "A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis." Journal of Engineering 2024.1 (2024): 3909173.
- He, Ke, Dan Dongseong Kim, and Muhammad Rizwan Asghar. "Adversarial machine learning for network intrusion detection systems: A comprehensive survey." IEEE Communications Surveys & Tutorials 25.1 (2023): 538-566.
- Lampe, Brooke, and Weizhi Meng. "Intrusion detection in the automotive domain: A comprehensive review." IEEE Communications Surveys & Tutorials (2023).
- Talukder, Md Alamin, et al. "A dependable hybrid machine learning model for network intrusion detection." Journal of Information Security and Applications 72 (2023): 103405.
- Qazi, Emad Ul Haq, Muhammad Hamza Faheem, and Tanveer Zia. "HDLNIDS: hybrid deep-learning-based network intrusion detection system." Applied Sciences 13.8 (2023): 4921.
- Kaur, Harmandeep, and Munish Kumar. "Signature identification and verification techniques: state-of-the-art work." Journal of Ambient Intelligence and Humanized Computing 14.2 (2023): 1027-1045.
- Asadi, Majid, Marzieh Hashemi, and Narayanaswamy Balakrishnan. "An overview of some classical models and discussion of the signature‐based models of preventive maintenance." Applied Stochastic Models in Business and Industry 39.1 (2023): 4-53.
- Cuchiero, Christa, Guido Gazzani, and Sara Svaluto-Ferro. "Signature-based models: Theory and calibration." SIAM journal on financial mathematics 14.3 (2023): 910-957.
- Bhavsar, Mansi, et al. "Anomaly-based intrusion detection system for IoT application." Discover Internet of Things 3.1 (2023): 5.
- Idrissi, Meryem Janati, et al. "Fed-anids: Federated learning for anomaly-based network intrusion detection systems." Expert Systems with Applications 234 (2023): 121000.
- Thanh, Nguyen Huu, et al. "On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks." Journal of Network and Systems Management 31.2 (2023): 43.
- Akhtar, Muhammad Shoaib, and Tao Feng. "Evaluation of machine learning algorithms for malware detection." Sensors 23.2 (2023): 946.
- Dey, Arun Kumar, Govind P. Gupta, and Satya Prakash Sahu. "Hybrid Meta-Heuristic based feature selection mechanism for cyber-attack detection in IoT-enabled networks." Procedia Computer Science 218 (2023): 318-327.
- Djenna, Amir, et al. "Artificial intelligence-based malware detection, analysis, and mitigation." Symmetry 15.3 (2023): 677.
- Kizza, Joseph Migga. "System intrusion detection and prevention." Guide to computer network security. Cham: Springer international publishing, 2024. 295-323.
- Omotunde, Habeeb, and Maryam Ahmed. "A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond." Mesopotamian Journal of CyberSecurity 2023 (2023): 115-133.
- Saviour, Mariya Princy Antony, and Dhandapani Samiappan. "IPFS based storage Authentication and access control model with optimization enabled deep learning for intrusion detection." Advances in Engineering Software 176 (2023): 103369.
- Javadpour, Amir, et al. "DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments." Cluster Computing 26.1 (2023): 367-384.
- Ahmadi, Sina. "Next Generation AI-Based Firewalls: A Comparative Study." International Journal of Computer (IJC) 49.1 (2023): 245-262.
- Bauböck, Rainer, and Julia Mourão Permoser. "Sanctuary, firewalls, regularisation: three inclusive responses to the presence of irregular migrants." Journal of Ethnic and Migration Studies 49.14 (2023): 3671-3688.
- Tian, Yue, et al. "Methodology for optimally designing firewalls in hydrogen refueling stations." International Journal of Hydrogen Energy 49 (2024): 1196-1209.
- Singh, Lakhvir, and Ram Singh. "Comparative Analysis of Traditional Firewalls and Next-Generation Firewalls: A Review." Latest Trends in Engineering and Technology: Proceedings of the 2nd International Conference on Latest Trends in Engineering and Technology (ICLTET 2023), July 13-14, 2023, Mohali, India. CRC Press, 2024.
- Benadjila, Ryad, and Arnaud Ebalard. "Randomness of random in Cisco ASA." Cryptology ePrint Archive (2023).
- Choi, Brendan, and Erwin Medina. "Creating IPSec Tunnels on Palo Alto Firewalls." Introduction to Ansible Network Automation: A Practical Primer. Berkeley, CA: Apress, 2023. 847-865.
- Singh, Monu, and Amit Kumar Singh. "A comprehensive survey on encryption techniques for digital images." Multimedia Tools and Applications 82.8 (2023): 11155-11187.
- Akinsanya, Michael Oladipo, Cynthia Chizoba Ekechi, and Chukwuekem David Okeke. "Virtual private networks (vpn): a conceptual review of security protocols and their application in modern networks." Engineering Science & Technology Journal 5.4 (2024): 1452-1472.
- Wang, Chunhua, et al. "High-dimensional memristive neural network and its application in commercial data encryption communication." Expert Systems with Applications 242 (2024): 122513.
- Koskinen, Jonne. "Cloud Security Architecture." (2023).
- Rivadeneira, Jorge Eduardo, et al. "User-centric privacy preserving models for a new era of the Internet of Things." Journal of Network and Computer Applications (2023): 103695.
- Anderson, Laura K. "Autistic experiences of applied behavior analysis." Autism 27.3 (2023): 737-750.
- Olabanji, Samuel Oladiipo, et al. "AI for Identity and Access Management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access control within cloud-based systems." Authorization, and Access Control within Cloud-Based Systems (January 25, 2024) (2024).
- Henriques, João, et al. "A forensics and compliance auditing framework for critical infrastructure protection." International Journal of Critical Infrastructure Protection 42 (2023): 100613.
In today's interconnected world, billions of
individuals rely on the internet for various activities,
from communication and commerce to entertainment and
education. However, this widespread connectivity also
brings about an increased risk of cyber threats and
malicious activities. In response to these challenges,
intrusion detection technology has emerged as a vital
component of modern cybersecurity strategies. This
paper presents a comprehensive literature survey
focusing on Internal Intrusion Detection Systems (IIDS)
and traditional Intrusion Detection Systems (IDS). These
systems utilize a diverse array of data mining and
forensic techniques algorithms to monitor and analyze
system activities in real-time, thereby detecting and
preventing potential security breaches. Additionally, the
paper explores the integration of data mining methods for
cyber analytics, offering valuable insights into the
development and enhancement of intrusion detection
capabilities. Through a thorough examination of existing
research and methodologies, this study aims to provide a
deeper understanding of the evolving landscape of
intrusion detection and contribute to the advancement of
cybersecurity practices in an increasingly digitized world.
Keywords :
Internal Intrusion Detection System (IIDS), Intrusion Detection System (IDS), System Call (SC), Denial of Service (DOS).