2022
DOI: 10.1007/s13369-022-07412-1
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 166 publications
0
12
0
Order By: Relevance
“…IDS are security tools that, like other measures such as firewalls, antivirus software, and access control schemes, are intended to strengthen the security of information and communication systems [32]. An IDS can be classified in two ways: based on data source/location and detection approach [33]. Based on the data source, Network Intrusion Detection Systems (NIDS) and Host Intrusion Detection Systems (HIDS) are the most well-known classifications.…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…IDS are security tools that, like other measures such as firewalls, antivirus software, and access control schemes, are intended to strengthen the security of information and communication systems [32]. An IDS can be classified in two ways: based on data source/location and detection approach [33]. Based on the data source, Network Intrusion Detection Systems (NIDS) and Host Intrusion Detection Systems (HIDS) are the most well-known classifications.…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…Accuracy is defined by (3), which reflects the percentage of correctly predicted samples among the total number of predicted samples:…”
Section: A Evaluation Indicatorsmentioning
confidence: 99%
“…Traditional cybersecurity methods (e.g., firewalls, user authentication, and data encryption) cannot handle the complex attacks that take place online. Intrusion detection systems (IDSs) are designed to detect a variety of anomalous patterns that serve as the attack signatures of new and known attacks [3], using advanced database systems with machine learning [4]. When an IDS reports potential malicious activities in an information system [5], it kicks off various analytical and alerting processes to confirm the nature of the attack and launch protection measures.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…An IDS is a security tool made to find and respond to harmful or unauthorized activity on a system or network. Its main goal is to quickly detect potential security breaches or intrusions so that appropriate countermeasures can be taken to preserve the integrity of the system and limit future harm (Alkasassbeh & Al-Haj Baddar, 2023). It is impossible to overestimate the importance of IDS in the context of CAVs.…”
Section: Introductionmentioning
confidence: 99%