A Comprehensive Systematic Literature Review on Intrusion Detection Systems
Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are added to the computer networks. These new devices ar...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
IEEE
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/06005477bb9d471284c8376c93bbe302 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:06005477bb9d471284c8376c93bbe302 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:06005477bb9d471284c8376c93bbe3022021-12-03T00:00:48ZA Comprehensive Systematic Literature Review on Intrusion Detection Systems2169-353610.1109/ACCESS.2021.3129336https://doaj.org/article/06005477bb9d471284c8376c93bbe3022021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9620099/https://doaj.org/toc/2169-3536Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are added to the computer networks. These new devices are also raising security issues in the computer networks. To effectively manage the computer network flows and provide the security in advance; the components of the IDSs, the approaches and technologies that are used, the nature of the attacks, and the tools that are used needs to be examined deeply. This paper discusses intrusion detection technologies, methodologies, and approaches and also investigates new attack types, protection mechanisms, and recent scientific studies that have been made in this area. In addition, available datasets, well-known IDS tools, and advantages and disadvantages of particular IDSs are explained deeply. We believe that this scientific review study presents a road map for researchers and industry employees who focus on IDSs.Merve Ozkan-OkayRefik SametOmer AslanDeepti GuptaIEEEarticleIntrusion detection systemIDS technologiesIDS methodologiesIDS approachesdatasetsIDS toolsElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 157727-157760 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Intrusion detection system IDS technologies IDS methodologies IDS approaches datasets IDS tools Electrical engineering. Electronics. Nuclear engineering TK1-9971 |
spellingShingle |
Intrusion detection system IDS technologies IDS methodologies IDS approaches datasets IDS tools Electrical engineering. Electronics. Nuclear engineering TK1-9971 Merve Ozkan-Okay Refik Samet Omer Aslan Deepti Gupta A Comprehensive Systematic Literature Review on Intrusion Detection Systems |
description |
Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are added to the computer networks. These new devices are also raising security issues in the computer networks. To effectively manage the computer network flows and provide the security in advance; the components of the IDSs, the approaches and technologies that are used, the nature of the attacks, and the tools that are used needs to be examined deeply. This paper discusses intrusion detection technologies, methodologies, and approaches and also investigates new attack types, protection mechanisms, and recent scientific studies that have been made in this area. In addition, available datasets, well-known IDS tools, and advantages and disadvantages of particular IDSs are explained deeply. We believe that this scientific review study presents a road map for researchers and industry employees who focus on IDSs. |
format |
article |
author |
Merve Ozkan-Okay Refik Samet Omer Aslan Deepti Gupta |
author_facet |
Merve Ozkan-Okay Refik Samet Omer Aslan Deepti Gupta |
author_sort |
Merve Ozkan-Okay |
title |
A Comprehensive Systematic Literature Review on Intrusion Detection Systems |
title_short |
A Comprehensive Systematic Literature Review on Intrusion Detection Systems |
title_full |
A Comprehensive Systematic Literature Review on Intrusion Detection Systems |
title_fullStr |
A Comprehensive Systematic Literature Review on Intrusion Detection Systems |
title_full_unstemmed |
A Comprehensive Systematic Literature Review on Intrusion Detection Systems |
title_sort |
comprehensive systematic literature review on intrusion detection systems |
publisher |
IEEE |
publishDate |
2021 |
url |
https://doaj.org/article/06005477bb9d471284c8376c93bbe302 |
work_keys_str_mv |
AT merveozkanokay acomprehensivesystematicliteraturereviewonintrusiondetectionsystems AT refiksamet acomprehensivesystematicliteraturereviewonintrusiondetectionsystems AT omeraslan acomprehensivesystematicliteraturereviewonintrusiondetectionsystems AT deeptigupta acomprehensivesystematicliteraturereviewonintrusiondetectionsystems AT merveozkanokay comprehensivesystematicliteraturereviewonintrusiondetectionsystems AT refiksamet comprehensivesystematicliteraturereviewonintrusiondetectionsystems AT omeraslan comprehensivesystematicliteraturereviewonintrusiondetectionsystems AT deeptigupta comprehensivesystematicliteraturereviewonintrusiondetectionsystems |
_version_ |
1718373970253709312 |