Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods

  • Panagiotou P
  • Mengidis N
  • Tsikrika T
  • et al.
N/ACitations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

[...]the survey concludes with a discussion of future IDS research directions and broader observations. [...]the NIDS is frequently completely transparent to the systems it is monitoring, allowing for excellent isolation and making NIDSs significantly less susceptible to interference from an attacker. The signature-based approach involves searching the received events for well-known attack patterns, whereas the anomaly-based approach seeks to detect new and unknown attacks by modelling the activities that are considered normal within a system and identifying potential attacks from behaviours that deviate from the known normal behaviour patterns.5 2.2.1 Signature-based Signature intrusion detection systems (SIDS) use pattern matching techniques to detect a known attack; these are also referred to as Knowledge-based Detection or Misuse Detection.6 Matching methods are used in SIDS to locate a previous intrusion triggering an alarm signal whenever an intrusion signature matches one from a previous intrusion existing in the signature database. [...]Windows registry and file systems have also been used as sources of information, although more seldom.

Cite

CITATION STYLE

APA

Panagiotou, P., Mengidis, N., Tsikrika, T., Vrochidis, S., & Kompatsiaris, I. (2021). Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods. Information & Security: An International Journal, 50, 37–48. https://doi.org/10.11610/isij.5016

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free