TY - JOUR KW - AI KW - anomaly detection KW - artificial intelligence KW - computer security KW - Cybersecurity KW - intrusion detection AU - Panos Panagiotou AU - Notis Mengidis AU - Theodora Tsikrika AU - Stefanos Vrochidis AU - Ioannis Kompatsiaris AB -
Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detections methods. Failure to prevent the intrusions could jeopardise security services’ credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.
BT - Information & Security: An International Journal DO - https://doi.org/10.11610/isij.5016 IS - 1 N2 -Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detections methods. Failure to prevent the intrusions could jeopardise security services’ credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.
PY - 2021 SP - 37 EP - 48 T2 - Information & Security: An International Journal TI - Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods VL - 50 ER -