Intrusion detection and prevention systems: A review

3Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, the various methods for intrusion detection and prevention are discussed based on the four review papers. In the first paper, the support vector machines and decision trees machine learning techniques are being used to train the data set for detecting DOS attacks in WSN and found that decision trees are more efficient than support vector machines. In the second paper, the routing attacks such as sinkhole and selective forwarding are being detected in the Internet of things for which two detection and prevention algorithms, i.e. key match algorithm (KMA) and cluster-based algorithm (CBA) are used. Same intrusion detection and prevention system which is developed for wired networks cannot be used for wireless networks. In the third paper, a system called wireless intrusion detection prevention and attack system `WIDPAS' is proposed which attacks the attacker and sends warning to the administrator. In the fourth paper, a method is used which uses filter firewall, honeypot intrusion detection, anomaly intrusion detection and prevention firewall to protect an organization’s network.

Cite

CITATION STYLE

APA

Ganesh, V., & Sharma, M. (2021). Intrusion detection and prevention systems: A review. In Lecture Notes in Networks and Systems (Vol. 145, pp. 835–844). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-7345-3_71

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free