...
首页> 外文期刊>Journal of Modern Technology and Engineering >AN IN-DEPTH CHARACTERIZATION OF INTRUSION DETECTIONSYSTEMS (IDS)
【24h】

AN IN-DEPTH CHARACTERIZATION OF INTRUSION DETECTIONSYSTEMS (IDS)

机译:入侵检测系统的深度表征(IDS)

获取原文
           

摘要

Currently, the Intrusion Detection System (IDS) is attracting both the commercial companies and theresearch community as IDS is playing an increasingly important role in most network systems to detect and blockpossi-ble attacks. This paper aims to present a general view of the state-of-the-art of the IDS, based on a proposedtaxonomy so that the researchers can quickly become familiar with the essential aspects of the intrusion detection techniques. The taxonomy includes reclassifying IDSs according to multiple bases, e.g., IDS’ data source,the detection method, and others. Also, comparisons among different detection approaches and various datacollection techniques are tabulated. Besides, the paper exhibits the taxonomy of anomaly-based IDSs classifyingthe promising techniques and summarizing the merits of the most recent anomaly-based techniques as a table.Furthermore, it deliberates the IDSs through various applications, like data centers, backbone, Fog, and CloudComputing, and IoT models, in addition to the most common prevailing models. Subsequently, multiple metricsand the datasets frequently used to assess the IDS are described concisely. Finally, the requirements and challengesof contemporary IDSs are mapped.
机译:目前,入侵检测系统(IDS)正在吸引商业公司和Theresearch社区,因为ID在大多数网络系统中扮演越来越重要的作用,以检测和阻止BLE-BLE攻击。本文旨在展示基于拟议的IDS最先进的人,以便研究人员可以快速熟悉入侵检测技术的基本方面。分类学包括根据多个基础的重新分类IDS,例如IDS数据源,检测方法等。而且,制表不同检测方法的比较和各种DatoCollection技术。此外,本文展示了基于异常的IDS分类,分类了有前途的技术,并总结了作为表格的最新基于异常的技术的优点.Furtheratore,它刻意通过各种应用程序,如数据中心,骨干,雾和和除了最常见的主要模型之外,云计算和IOT模型。随后,简明扼要地描述了多个METRICSAND经常用于评估ID的数据集。最后,映射了当代IDS的要求和挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号