2019
DOI: 10.1007/978-981-32-9949-8_48
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection and Prevention Systems: An Updated Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(19 citation statements)
references
References 4 publications
0
19
0
Order By: Relevance
“…One of them is the Intrusion Detection and Prevention System (IDPS) which is a computer or software program designed for network or system monitoring. It recognizes weaknesses, reports malicious attacks, and imposes protective methods to keep up with the progress of computerrelated crimes via multiple response techniques [87].…”
Section: Integritymentioning
confidence: 99%
“…One of them is the Intrusion Detection and Prevention System (IDPS) which is a computer or software program designed for network or system monitoring. It recognizes weaknesses, reports malicious attacks, and imposes protective methods to keep up with the progress of computerrelated crimes via multiple response techniques [87].…”
Section: Integritymentioning
confidence: 99%
“…An IDS is a tool that scans network traffic for any harmful activity or policy breaches. It is a system for monitoring network traffic for malicious activities and alerting network administrators to such abnormal activities [13]. IDSs achieve this by gathering data from several systems and network sources and analyzing those data for possible threats.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Powering the IDPS system with ML, SDN, and MUD proving to be useful. IDPS system becomes a lot more effective and worthy for network security as in paper [7] presented an updated review on the IDPS systems. It shows the classification of IDPS systems and their role in securing the conventional network.…”
Section: B Related Workmentioning
confidence: 99%
“…To mitigate these kinds of attacks, the researchers suggest the IDPS. This system is not visible to the attackers thus restricts the communication to the other components of the network [7]. The taxonomy of IDPS in IoT is given in Fig.…”
Section: B Overview Of Intrusion Detection and Prevention Systemmentioning
confidence: 99%