Next generation systems — Scope and application of intrusion detection and prevention systems (IDPS) a systematic literature review

Author(s):  
Jezreel Mejia Miranda ◽  
Faleg A. Peralta Mtz ◽  
Mirna Ariadna Munoz Mata
Author(s):  
Mario Enrique Cueva Hurtado ◽  
Gabriela Gutierrez ◽  
Cristian Ramiro Narvaez Guillen ◽  
Francisco Javier Alvarez Pineda ◽  
Maria del Cisne Ruilova Sanchez

2021 ◽  
Vol 11 (18) ◽  
pp. 8383 ◽  
Author(s):  
Muaadh A. Alsoufi ◽  
Shukor Razak ◽  
Maheyzah Md Siraj ◽  
Ibtehal Nafea ◽  
Fuad A. Ghaleb ◽  
...  

The Internet of Things (IoT) concept has emerged to improve people’s lives by providing a wide range of smart and connected devices and applications in several domains, such as green IoT-based agriculture, smart farming, smart homes, smart transportation, smart health, smart grid, smart cities, and smart environment. However, IoT devices are at risk of cyber attacks. The use of deep learning techniques has been adequately adopted by researchers as a solution in securing the IoT environment. Deep learning has also successfully been implemented in various fields, proving its superiority in tackling intrusion detection attacks. Due to the limitation of signature-based detection for unknown attacks, the anomaly-based Intrusion Detection System (IDS) gains advantages to detect zero-day attacks. In this paper, a systematic literature review (SLR) is presented to analyze the existing published literature regarding anomaly-based intrusion detection, using deep learning techniques in securing IoT environments. Data from the published studies were retrieved from five databases (IEEE Xplore, Scopus, Web of Science, Science Direct, and MDPI). Out of 2116 identified records, 26 relevant studies were selected to answer the research questions. This review has explored seven deep learning techniques practiced in IoT security, and the results showed their effectiveness in dealing with security challenges in the IoT ecosystem. It is also found that supervised deep learning techniques offer better performance, compared to unsupervised and semi-supervised learning. This analysis provides an insight into how the use of data types and learning methods will affect the performance of deep learning techniques for further contribution to enhancing a novel model for anomaly intrusion detection and prediction.


2021 ◽  
Vol 3 ◽  
Author(s):  
David Schubert ◽  
Hendrik Eikerling ◽  
Jörg Holtmann

Modern and flexible application-level software platforms increase the attack surface of connected vehicles and thereby require automotive engineers to adopt additional security control techniques. These techniques encompass host-based intrusion detection systems (HIDSs) that detect suspicious activities in application contexts. Such application-aware HIDSs originate in information and communications technology systems and have a great potential to deal with the flexible nature of application-level software platforms. However, the elementary characteristics of known application-aware HIDS approaches and thereby the implications for their transfer to the automotive sector are unclear. In previous work, we presented a systematic literature review (SLR) covering the state of the art of application-aware HIDS approaches. We synthesized our findings by means of a fine-grained classification for each approach specified through a feature model and corresponding variant models. These models represent the approaches’ elementary characteristics. Furthermore, we summarized key findings and inferred implications for the transfer of application-aware HIDSs to the automotive sector. In this article, we extend the previous work by several aspects. We adjust the quality evaluation process within the SLR to be able to consider high quality conference publications, which results in an extended final pool of publications. For supporting HIDS developers on the task of configuring HIDS analysis techniques based on machine learning, we report on initial results on the applicability of AutoML. Furthermore, we present lessons learned regarding the application of the feature and variant model approach for SLRs. Finally, we more thoroughly describe the SLR study design.


2018 ◽  
Vol 14 ◽  
pp. 58-64 ◽  
Author(s):  
Amelia K. Sofjan ◽  
Ardath Mitchell ◽  
Dhara N. Shah ◽  
Tam Nguyen ◽  
Mui Sim ◽  
...  

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 56046-56058 ◽  
Author(s):  
Fadi Salo ◽  
Mohammadnoor Injadat ◽  
Ali Bou Nassif ◽  
Abdallah Shami ◽  
Aleksander Essex

Sign in / Sign up

Export Citation Format

Share Document