当前位置: X-MOL 学术IEEE Commun. Surv. Tutor. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Intrusion Detection Systems: A Cross-Domain Overview
IEEE Communications Surveys & Tutorials ( IF 35.6 ) Pub Date : 2019-01-01 , DOI: 10.1109/comst.2019.2922584
Lionel N. Tidjon , Marc Frappier , Amel Mammar

Nowadays, network technologies are essential for transferring and storing various information of users, companies, and industries. However, the growth of the information transfer rate expands the attack surface, offering a rich environment to intruders. Intrusion detection systems (IDSs) are widespread systems able to passively or actively control intrusive activities in a defined host and network perimeter. Recently, different IDSs have been proposed by integrating various detection techniques, generic or adapted to a specific domain and to the nature of attacks operating on. The cybersecurity landscape deals with tremendous diverse event streams that exponentially increase the attack vectors. Event stream processing (ESP) methods appear to be solutions that leverage event streams to provide actionable insights and faster detection. In this paper, we briefly describe domains (as well as their vulnerabilities) on which recent papers were-based. We also survey standards for vulnerability assessment and attack classification. Afterwards, we carry out a classification of IDSs, evaluation metrics, and datasets. Next, we provide the technical details and an evaluation of the most recent work on IDS techniques and ESP approaches covering different dimensions (axes): domains, architectures, and local communication technologies. Finally, we discuss challenges and strategies to improve IDS in terms of accuracy, performance, and robustness.

中文翻译:

入侵检测系统:跨域概述

如今,网络技术对于传输和存储用户、公司和行业的各种信息至关重要。然而,信息传输速率的增长扩大了攻击面,为入侵者提供了丰富的环境。入侵检测系统 (IDS) 是一种应用广泛的系统,能够被动或主动控制定义的主机和网络边界中的入侵活动。最近,通过集成各种检测技术(通用的或适用于特定域和攻击的性质),提出了不同的 IDS。网络安全领域处理大量不同的事件流,这些事件流呈指数级增加攻击向量。事件流处理 (ESP) 方法似乎是利用事件流来提供可操作的洞察力和更快的检测的解决方案。在本文中,我们简要描述了最近论文所基于的域(以及它们的漏洞)。我们还调查了漏洞评估和攻击分类的标准。之后,我们对 IDS、评估指标和数据集进行分类。接下来,我们提供技术细节和对涵盖不同维度(轴)的 IDS 技术和 ESP 方法的最新工作的评估:域、架构和本地通信技术。最后,我们讨论了在准确性、性能和稳健性方面改进 IDS 的挑战和策略。接下来,我们提供技术细节和对涵盖不同维度(轴)的 IDS 技术和 ESP 方法的最新工作的评估:域、架构和本地通信技术。最后,我们讨论了在准确性、性能和稳健性方面改进 IDS 的挑战和策略。接下来,我们提供技术细节和对 IDS 技术和 ESP 方法的最新工作的评估,涵盖不同维度(轴):域、架构和本地通信技术。最后,我们讨论了在准确性、性能和稳健性方面改进 IDS 的挑战和策略。
更新日期:2019-01-01
down
wechat
bug