Published October 1, 2021 | Version v1
Journal article Open

Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods.

  • 1. Centre for Research and Technology-Hellas (CERTH), Thessaloniki, Greece


Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detectionEngl methods. Failure to prevent the intrusions could jeopardise security services’ credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.


Host-based intrusion detection using signature-based and AI-driven anomaly detection methods_final.pdf

Additional details


ECHO – European network of Cybersecurity centres and competence Hub for innovation and Operations 830943
European Commission