Journal article Open Access

Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods.

Panagiotou, Panos; Mengidis, Notis; Tsikrika, Theodora; Vrochidis, Stefanos; Kompatsiaris, Ioannis


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2021-10-01</subfield>
  </datafield>
  <controlfield tag="005">20211008134833.0</controlfield>
  <controlfield tag="001">5555915</controlfield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:5555915</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detectionEngl methods. Failure to prevent the intrusions could jeopardise security services&amp;rsquo; credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece</subfield>
    <subfield code="0">(orcid)0000-0003-3588-1007</subfield>
    <subfield code="a">Mengidis, Notis</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece</subfield>
    <subfield code="0">(orcid)0000-0003-4148-9028</subfield>
    <subfield code="a">Tsikrika, Theodora</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece</subfield>
    <subfield code="0">(orcid)0000-0002-2505-9178</subfield>
    <subfield code="a">Vrochidis, Stefanos</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece</subfield>
    <subfield code="0">(orcid)0000-0001-6447-9020</subfield>
    <subfield code="a">Kompatsiaris, Ioannis</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">1061728</subfield>
    <subfield code="z">md5:ca6d8f65b2d677eb2164752983753c44</subfield>
    <subfield code="u">https://zenodo.org/record/5555915/files/Host-based intrusion detection using signature-based and AI-driven anomaly detection methods_final.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece</subfield>
    <subfield code="0">(orcid)0000-0002-1964-3618</subfield>
    <subfield code="a">Panagiotou, Panos</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.11610/isij.5016</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods.</subfield>
  </datafield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">830943</subfield>
    <subfield code="a">European network of Cybersecurity centres and competence Hub for innovation and Operations</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
</record>
23
12
views
downloads
Views 23
Downloads 12
Data volume 12.7 MB
Unique views 22
Unique downloads 11

Share

Cite as