01389nas a2200229 4500000000100000008004100001653000700042653002200049653002800071653002200099653001800121653002400139100002100163700001900184700002200203700002300225700002500248245009700273300001100370490000700381520077100388 2021 d10aAI10aanomaly detection10aartificial intelligence10acomputer security10aCybersecurity10aintrusion detection1 aPanos Panagiotou1 aNotis Mengidis1 aTheodora Tsikrika1 aStefanos Vrochidis1 aIoannis Kompatsiaris00aHost-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods a37-48 0 v503 a
Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detections methods. Failure to prevent the intrusions could jeopardise security services’ credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.