Detection and prevention of intrusions into computer systems

Authors

  • Fatmir Basholli
  • Adisa Daberdinİ
  • Armand Basholli

Keywords:

Intrusion detection, Denial of Service, Network-based, Interventions, Detection systems

Abstract

Historically, the concept of ownership has dictated that individuals and groups tend to protect valuable resources. No matter how much protection is given to the property, there is always a weak point, where the security provided at certain points fails. This general notion has guided the concept of systems security and defined the disciplines in cyber security and especially that of computer networks. Computer network security consists of three principles: prevention, detection and reaction/response. Although these three are the basic components of security, the main focus is on detection and prevention resources because if we are able to detect and prevent all security threats, then there is no need for reaction and response. Intrusion prevention is the art of preventing unauthorized access to system resources. The two processes are related in a sense, where intrusion detection passively watches for intrusions into the system, and intrusion prevention actively filters network traffic to prevent intrusion attempts. In the continuation of the treatment, we will focus on these two processes.

References

Chand, N., Mishra, P., Krishna, C. R., Pilli, E. S., & Govil, M. C. (2016, April). A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection. In 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Spring) (pp. 1-6). IEEE.

Kizza, J. M., Kizza, W., & Wheeler. (2013). Guide to computer network security.

Saheed, Y. K., Abiodun, A. I., Misra, S., Holone, M. K., & Colomo-Palacios, R. (2022). A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal, 61(12), 9395-9409.

SANS Institute, “The History and Evolution of Intrusion Detection.” [Online]. Available: https://www.sans.org/reading-room/whitepapers/detection/history-evolution-intrusion-detection-344. [Accessed: 20-Feb-2016].

Sharma, R. K., & Pippal, R. S. (2020, September). Malicious Attack and Intrusion Prevention in IoT Network Using Blockchain Based Security Analysis. In 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 380-385). IEEE.

Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4), 1-29.

Kumar, R., Kumar, P., Tripathi, R., Gupta, G. P., Garg, S., & Hassan, M. M. (2022). A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. Journal of Parallel and Distributed Computing, 164, 55-68.

Mishra, N., & Pandya, S. (2021). Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 9, 59353-59377.

Liu, Y. S., Lai, Y. K., Wang, Z. H., & Yan, H. B. (2019). A new learning approach to malware classification using discriminative feature extraction. IEEE Access, 7, 13015-13023.

Masduki, B. W., Ramli, K., Saputra, F. A., & Sugiarto, D. (2015, August). Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS). In 2015 International Conference on Quality in Research (QiR) (pp. 56-64). IEEE.

Basati, A., & Faghih, M. M. (2022). PDAE: Efficient network intrusion detection in IoT using parallel deep auto-encoders. Information Sciences, 598, 57-74.

McHugh, J. (2000). Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions on Information and System Security (TISSEC), 3(4), 262-294.

Al-Taleb, N., & Saqib, N. A. (2020, September). Attacks Detection and Prevention Systems for IoT Networks: A Survey. In 2020 International Conference on Computing and Information Technology (ICCIT-1441) (pp. 1-5). IEEE.

http://www.combofix.org/what-it-is-network-intrusion-detection-system.php

Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy.

Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.

https://cyber-defense.sans.org/resources/papers/gsec/host-vs-network-based-intrusion-detection-systems-102574.

Soniya, S. S., & Vigila, S. M. C. (2016, March). Intrusion detection system: Classification and techniques. In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-7). IEEE.

Downloads

Published

2023-03-22