Abstract

Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and availability. Numerous intrusion detection methods have been proposed in the literature to tackle computer security threats, which can be broadly classified into Signature-based Intrusion Detection Systems (SIDS) and Anomaly-based Intrusion Detection Systems (AIDS). This survey paper presents a taxonomy of contemporary IDS, a comprehensive review of notable recent works, and an overview of the datasets commonly used for evaluation purposes. It also presents evasion techniques used by attackers to avoid detection and discusses future research challenges to counter such techniques so as to make computer systems more secure.

Keywords

Intrusion detection systemComputer scienceCredibilityConfidentialityComputer securityAnomaly detectionAnomaly-based intrusion detection systemData miningData science

Affiliated Institutions

Related Publications

Federated Machine Learning

Today’s artificial intelligence still faces two major challenges. One is that, in most industries, data exists in the form of isolated islands. The other is the strengthening of...

2019 ACM Transactions on Intelligent Syste... 5133 citations

Publication Info

Year
2019
Type
article
Volume
2
Issue
1
Citations
1618
Access
Closed

Social Impact

Social media, news, blog, policy document mentions

Citation Metrics

1618
OpenAlex
68
Influential

Cite This

Ansam Khraisat, Iqbal Gondal, Peter Vamplew et al. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity , 2 (1) . https://doi.org/10.1186/s42400-019-0038-7

Identifiers

DOI
10.1186/s42400-019-0038-7

Data Quality

Data completeness: 81%