Review of intrusion detection systems

In the modern digital era, the escalating dependence on interconnected systems raises growing concerns in the field of cybersecurity. This article addresses the pressing need to enhance security measures using Intrusion Detection Systems (IDS), emphasizing their role in the analysis of system logs and data streams to detect and prevent malicious attacks. Intrusion Detection Systems play a crucial role in fortifying networks against potential threats, providing a fundamental level of protection for personal data, applications, and business transactions. The article explores the mechanisms of operation of Intrusion Detection Systems, their classifications, algorithms, as well as their advantages and disadvantages. Structured sequentially, the article commences with an introduction, followed by discussions on the common goals, general structure, signature-based intrusion detection systems, anomaly detection systems, and hybrid intrusion detection systems. The concluding section consolidates the key findings, formulating comprehensive conclusions about the intricate landscape of intrusion detection systems.

Authors: M. Al-Tameemi, M. B. Hassan, A. A. Paznikov, M. N. Al-Khaykanee, E. B. Albadrawi

Direction: Informatics, Computer Technologies And Control

Keywords: intrusion detection system, signature-based detection, anomaly detection, hybrid intrusion detection system


View full article