Journal article Open Access

Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods.

Panagiotou, Panos; Mengidis, Notis; Tsikrika, Theodora; Vrochidis, Stefanos; Kompatsiaris, Ioannis


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/bc400346-4ca2-40eb-8dc2-e22ccdf80fe7/Host-based%20intrusion%20detection%20using%20signature-based%20and%20AI-driven%20anomaly%20detection%20methods_final.pdf"
      }, 
      "checksum": "md5:ca6d8f65b2d677eb2164752983753c44", 
      "bucket": "bc400346-4ca2-40eb-8dc2-e22ccdf80fe7", 
      "key": "Host-based intrusion detection using signature-based and AI-driven anomaly detection methods_final.pdf", 
      "type": "pdf", 
      "size": 1061728
    }
  ], 
  "owners": [
    258244
  ], 
  "doi": "10.11610/isij.5016", 
  "stats": {
    "version_unique_downloads": 11.0, 
    "unique_views": 22.0, 
    "views": 23.0, 
    "version_views": 23.0, 
    "unique_downloads": 11.0, 
    "version_unique_views": 22.0, 
    "volume": 12740736.0, 
    "version_downloads": 12.0, 
    "downloads": 12.0, 
    "version_volume": 12740736.0
  }, 
  "links": {
    "doi": "https://doi.org/10.11610/isij.5016", 
    "latest_html": "https://zenodo.org/record/5555915", 
    "bucket": "https://zenodo.org/api/files/bc400346-4ca2-40eb-8dc2-e22ccdf80fe7", 
    "badge": "https://zenodo.org/badge/doi/10.11610/isij.5016.svg", 
    "html": "https://zenodo.org/record/5555915", 
    "latest": "https://zenodo.org/api/records/5555915"
  }, 
  "created": "2021-10-08T09:39:59.399934+00:00", 
  "updated": "2021-10-08T13:48:33.923252+00:00", 
  "conceptrecid": "5555914", 
  "revision": 2, 
  "id": 5555915, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.11610/isij.5016", 
    "description": "<p>Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detectionEngl methods. Failure to prevent the intrusions could jeopardise security services&rsquo; credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.</p>", 
    "language": "eng", 
    "title": "Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods.", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "5555914"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "5555915"
          }
        }
      ]
    }, 
    "grants": [
      {
        "code": "830943", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::830943"
        }, 
        "title": "European network of Cybersecurity centres and competence Hub for innovation and Operations", 
        "acronym": "ECHO", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "publication_date": "2021-10-01", 
    "creators": [
      {
        "orcid": "0000-0002-1964-3618", 
        "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
        "name": "Panagiotou, Panos"
      }, 
      {
        "orcid": "0000-0003-3588-1007", 
        "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
        "name": "Mengidis, Notis"
      }, 
      {
        "orcid": "0000-0003-4148-9028", 
        "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
        "name": "Tsikrika, Theodora"
      }, 
      {
        "orcid": "0000-0002-2505-9178", 
        "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
        "name": "Vrochidis, Stefanos"
      }, 
      {
        "orcid": "0000-0001-6447-9020", 
        "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
        "name": "Kompatsiaris, Ioannis"
      }
    ], 
    "access_right": "open", 
    "resource_type": {
      "subtype": "article", 
      "type": "publication", 
      "title": "Journal article"
    }
  }
}
23
12
views
downloads
Views 23
Downloads 12
Data volume 12.7 MB
Unique views 22
Unique downloads 11

Share

Cite as