Author:
Sarveswara Gupta P. M. N. V. V.,Venkateswarlu B.,Karthikeya S.,Kumar Chandol Mohan,Sumanth V. G. Sai
Abstract
It is crucial to secure digital assets and networks against harmful activity in the linked world of today. Through the detection and mitigation of unauthorized access, malicious activity, and possible security threats, Intrusion Detection and Prevention Systems (IDPS) are essential to the protection of systems and networks. The development, approaches, technologies, difficulties, and future directions of intrusion detection and prevention systems are all covered in detail in this research paper. The study examines the advantages and disadvantages of several IDPS methodologies, such as hybrid, anomaly-based, and signature-based techniques. It also addresses how to improve the efficacy and efficiency of IDPS using cutting- edge methods like big data analytics, artificial intelligence, and machine learning. In addition, the study discusses and suggests possible solutions for the problems that IDPS faces, including false positives, evasion strategies, and scalability concerns. In order to assist academics, researchers, and practitioners with insights, it concludes by outlining future directions for study and development in the field of intrusion detection and prevention systems.
Publisher
International Journal of Innovative Science and Research Technology
Reference43 articles.
1. Anderson, D. (2019). Intrusion Detection and Prevention Systems: Concepts and Techniques (Advances in Information Security, Privacy, and Ethics). IGI Global.
2. Kent, K. (2018). Network Intrusion Detection and Prevention: Concepts and Techniques. Springer.
3. A. Gendreau and M. Moorman, “Survey of intrusion detection systems towards an end to end secure internet of things,” in Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud (FiCloud '16), pp. 84–90, IEEE Computer, Vienna, Austria, August 2016.
4. M. Ammar, G. Russello, and B. Crispo, “Internet of Things: a survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018.
5. F. Restuccia, S. D'Oro, and T. Melodia, “Securing the internet of things in the age of machine learning and software-defined networking,” IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4829–4842, 2018.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献