A Comprehensive Systematic Literature Review on Intrusion Detection Systems

Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are added to the computer networks. These new devices ar...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Merve Ozkan-Okay, Refik Samet, Omer Aslan, Deepti Gupta
Formato: article
Lenguaje:EN
Publicado: IEEE 2021
Materias:
Acceso en línea:https://doaj.org/article/06005477bb9d471284c8376c93bbe302
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:06005477bb9d471284c8376c93bbe302
record_format dspace
spelling oai:doaj.org-article:06005477bb9d471284c8376c93bbe3022021-12-03T00:00:48ZA Comprehensive Systematic Literature Review on Intrusion Detection Systems2169-353610.1109/ACCESS.2021.3129336https://doaj.org/article/06005477bb9d471284c8376c93bbe3022021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9620099/https://doaj.org/toc/2169-3536Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are added to the computer networks. These new devices are also raising security issues in the computer networks. To effectively manage the computer network flows and provide the security in advance; the components of the IDSs, the approaches and technologies that are used, the nature of the attacks, and the tools that are used needs to be examined deeply. This paper discusses intrusion detection technologies, methodologies, and approaches and also investigates new attack types, protection mechanisms, and recent scientific studies that have been made in this area. In addition, available datasets, well-known IDS tools, and advantages and disadvantages of particular IDSs are explained deeply. We believe that this scientific review study presents a road map for researchers and industry employees who focus on IDSs.Merve Ozkan-OkayRefik SametOmer AslanDeepti GuptaIEEEarticleIntrusion detection systemIDS technologiesIDS methodologiesIDS approachesdatasetsIDS toolsElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 157727-157760 (2021)
institution DOAJ
collection DOAJ
language EN
topic Intrusion detection system
IDS technologies
IDS methodologies
IDS approaches
datasets
IDS tools
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Intrusion detection system
IDS technologies
IDS methodologies
IDS approaches
datasets
IDS tools
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Merve Ozkan-Okay
Refik Samet
Omer Aslan
Deepti Gupta
A Comprehensive Systematic Literature Review on Intrusion Detection Systems
description Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are added to the computer networks. These new devices are also raising security issues in the computer networks. To effectively manage the computer network flows and provide the security in advance; the components of the IDSs, the approaches and technologies that are used, the nature of the attacks, and the tools that are used needs to be examined deeply. This paper discusses intrusion detection technologies, methodologies, and approaches and also investigates new attack types, protection mechanisms, and recent scientific studies that have been made in this area. In addition, available datasets, well-known IDS tools, and advantages and disadvantages of particular IDSs are explained deeply. We believe that this scientific review study presents a road map for researchers and industry employees who focus on IDSs.
format article
author Merve Ozkan-Okay
Refik Samet
Omer Aslan
Deepti Gupta
author_facet Merve Ozkan-Okay
Refik Samet
Omer Aslan
Deepti Gupta
author_sort Merve Ozkan-Okay
title A Comprehensive Systematic Literature Review on Intrusion Detection Systems
title_short A Comprehensive Systematic Literature Review on Intrusion Detection Systems
title_full A Comprehensive Systematic Literature Review on Intrusion Detection Systems
title_fullStr A Comprehensive Systematic Literature Review on Intrusion Detection Systems
title_full_unstemmed A Comprehensive Systematic Literature Review on Intrusion Detection Systems
title_sort comprehensive systematic literature review on intrusion detection systems
publisher IEEE
publishDate 2021
url https://doaj.org/article/06005477bb9d471284c8376c93bbe302
work_keys_str_mv AT merveozkanokay acomprehensivesystematicliteraturereviewonintrusiondetectionsystems
AT refiksamet acomprehensivesystematicliteraturereviewonintrusiondetectionsystems
AT omeraslan acomprehensivesystematicliteraturereviewonintrusiondetectionsystems
AT deeptigupta acomprehensivesystematicliteraturereviewonintrusiondetectionsystems
AT merveozkanokay comprehensivesystematicliteraturereviewonintrusiondetectionsystems
AT refiksamet comprehensivesystematicliteraturereviewonintrusiondetectionsystems
AT omeraslan comprehensivesystematicliteraturereviewonintrusiondetectionsystems
AT deeptigupta comprehensivesystematicliteraturereviewonintrusiondetectionsystems
_version_ 1718373970253709312