Possibility of protection against unauthorized interference in telecommunication systems

Main Article Content

Fatmir Basholli
Adisa Daberdini
Armand Basholli


Historically, the concept of ownership has dictated that individuals and groups tend to protect valuable resources. Regardless of how much protection is given to the property, there is always a weak point, where the security provided can fail at certain points. This general notion has guided the concept of systems security and defined the disciplines in cyber security and especially that of computer networks. Computer network security consists of three principles: prevention, detection and response. Although these three are the basic components of security, the main focus is on detection and prevention resources because if we are able to detect and prevent all security threats, then there is no need for reaction and response. Intrusion detection is a technique of detecting unauthorized access to a computer system or a computer network. An intrusion into a system is an attempt by an outsider to gain illegal access to the system. Intrusion prevention, on the other hand, is the art of preventing unauthorized access to a system's resources. The two processes are related in a sense, where intrusion detection passively watches for intrusions into the system, and intrusion prevention actively filters network traffic to prevent intrusion attempts. In the continuation of the treatment, we will focus on these two processes.

Article Details

How to Cite
Basholli, F. ., Daberdini , A. ., & Basholli , A. . (2023). Possibility of protection against unauthorized interference in telecommunication systems. Engineering Applications, 2(3), 265–278. Retrieved from https://publish.mersin.edu.tr/index.php/enap/article/view/966


Chand, N., Mishra, P., Krishna, C. R., Pilli, E. S., & Govil, M. C. (2016, April). A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection. In 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Spring), 1-6. IEEE. https://doi.org/10.1109/ICACCA.2016.7578859

Kizza, J. M. (2017). Guide to Computer Network Security. https://doi.org/10.1007/978-3-319-55606-2

Saheed, Y. K., Abiodun, A. I., Misra, S., Holone, M. K., & Colomo-Palacios, R. (2022). A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal, 61(12), 9395-9409. https://doi.org/10.1016/j.aej.2022.02.063

SANS Institute (2016). The History and Evolution of Intrusion Detection. https://www.sans.org/reading-room/whitepapers/detection/history-evolution-intrusion-detection-344

Sharma, R. K., & Pippal, R. S. (2020, September). Malicious Attack and Intrusion Prevention in IoT Network Using Blockchain Based Security Analysis. In 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), 380-385. IEEE. https://doi.org/10.1109/CICN49253.2020.9242610

Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4), 1-29. https://doi.org/10.1145/2542049

Kumar, R., Kumar, P., Tripathi, R., Gupta, G. P., Garg, S., & Hassan, M. M. (2022). A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. Journal of Parallel and Distributed Computing, 164, 55-68. https://doi.org/10.1016/j.jpdc.2022.01.030


Mishra, N., & Pandya, S. (2021). Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 9, 59353-59377. https://doi.org/10.1109/ACCESS.2021.3073408

Liu, Y. S., Lai, Y. K., Wang, Z. H., & Yan, H. B. (2019). A new learning approach to malware classification using discriminative feature extraction. IEEE Access, 7, 13015-13023. https://doi.org/10.1109/ACCESS.2019.2892500

Masduki, B. W., Ramli, K., Saputra, F. A., & Sugiarto, D. (2015, August). Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS). In 2015 International Conference on Quality in Research (QiR), 56-64. IEEE. https://doi.org/10.1109/QiR.2015.7374895

Basati, A., & Faghih, M. M. (2022). PDAE: Efficient network intrusion detection in IoT using parallel deep auto-encoders. Information Sciences, 598, 57-74. https://doi.org/10.1016/j.ins.2022.03.065

McHugh, J. (2000). Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions on Information and System Security (TISSEC), 3(4), 262-294. https://doi.org/10.1145/382912.382923

Al-Taleb, N., & Saqib, N. A. (2020, September). Attacks detection and prevention systems for IoT networks: a survey. In 2020 International Conference on Computing and Information Technology (ICCIT-1441) 1-5. IEEE. https://doi.org/10.1109/ICCIT-144147971.2020.9213770


Axelsson, S. (2005). Intrusion detection systems: a survey and taxonomy. 2000. Chalmers University of Technology: Goteborg, Sweden.

Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24. https://doi.org/10.1016/j.jnca.2012.09.004

Sans Penetration Testing (2001). Host-vs. Network-Based Intrusion Detection Systems. https://cyber-defense.sans.org/resources/papers/gsec/host-vs-network-based-intrusion-detection-systems.

SANS Institute InfoSec Reading Room (2001). Application of Neural Networks to Intrusion Detection. https://www.sans.org/reading-room/whitepapers/detection/application-neural-networks-intrusion-detection.

Soniya, S. S., & Vigila, S. M. C. (2016, March). Intrusion detection system: Classification and techniques. In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-7). IEEE. https://doi.org/10.1109/ICCPCT.2016.7530231

Basholli, F., Daberdinİ, A., & Basholli, A. (2023). Detection and prevention of intrusions into computer systems. Advanced Engineering Days (AED), 6, 138-141.