Journal article Open Access

Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods.

Panagiotou, Panos; Mengidis, Notis; Tsikrika, Theodora; Vrochidis, Stefanos; Kompatsiaris, Ioannis


JSON-LD (schema.org) Export

{
  "inLanguage": {
    "alternateName": "eng", 
    "@type": "Language", 
    "name": "English"
  }, 
  "description": "<p>Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detectionEngl methods. Failure to prevent the intrusions could jeopardise security services&rsquo; credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.</p>", 
  "license": "https://creativecommons.org/licenses/by/4.0/legalcode", 
  "creator": [
    {
      "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
      "@id": "https://orcid.org/0000-0002-1964-3618", 
      "@type": "Person", 
      "name": "Panagiotou, Panos"
    }, 
    {
      "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
      "@id": "https://orcid.org/0000-0003-3588-1007", 
      "@type": "Person", 
      "name": "Mengidis, Notis"
    }, 
    {
      "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
      "@id": "https://orcid.org/0000-0003-4148-9028", 
      "@type": "Person", 
      "name": "Tsikrika, Theodora"
    }, 
    {
      "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
      "@id": "https://orcid.org/0000-0002-2505-9178", 
      "@type": "Person", 
      "name": "Vrochidis, Stefanos"
    }, 
    {
      "affiliation": "Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece", 
      "@id": "https://orcid.org/0000-0001-6447-9020", 
      "@type": "Person", 
      "name": "Kompatsiaris, Ioannis"
    }
  ], 
  "headline": "Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods.", 
  "image": "https://zenodo.org/static/img/logos/zenodo-gradient-round.svg", 
  "datePublished": "2021-10-01", 
  "url": "https://zenodo.org/record/5555915", 
  "@context": "https://schema.org/", 
  "identifier": "https://doi.org/10.11610/isij.5016", 
  "@id": "https://doi.org/10.11610/isij.5016", 
  "@type": "ScholarlyArticle", 
  "name": "Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods."
}
23
12
views
downloads
Views 23
Downloads 12
Data volume 12.7 MB
Unique views 22
Unique downloads 11

Share

Cite as