A Review of Intrusion Detection System: Methodology, Classification

Article Sidebar

Main Article Content

YOUSEF ABUADLLA

Abstract: An Intrusion Detection System is the process of monitoring events within a computer network and analyzing them for unusual behavior. Moreover, IDS detects attempts at misuse, whether by authorized users or external parties who seek to abuse privileges or exploit security vulnerabilities. Computer intruders, who can be found across the internet, pose a significant threat, making it challenging to ensure that information systems are secure and maintained in a safe state throughout their lifetime and use. Intrusion Detection Systems can be software or hardware products designed to monitor system usage and identify any signs of an insecure state. This paper aims to review the methodology of intrusion detection systems and their classifications, summarizing the advantages and disadvantages of the most used approaches.

A Review of Intrusion Detection System: Methodology, Classification . (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(4), 366-373. https://doi.org/10.51583/IJLTEMAS.2025.140400039

Downloads

References

Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Survey Tutorial 16(1):266–282. DOI: https://doi.org/10.1109/SURV.2013.050113.00191

Bai Y. and Kobayashi H., "Intrusion Detection Systems: Technology and Development", 17th International Conference on Advanced Information Networking Applications.

Creech G, Hu J, A semantic approach to host-based intrusion detection systems using Contiguous and Discontinuous system call patterns, 2014a, IEEE Trans Compute. DOI: https://doi.org/10.1109/TC.2013.13

D. Herrmann, "A practical guide to security engineering and information assurance", 2002, www.auerbach publications.com. DOI: https://doi.org/10.1201/9781420031492

DARPA1998 http://www.ll.mit.edu/IST/ideval/docs/1998.

Dorothy, Denning. “An intrusion-detection model,” IEEE Transactions on Software Engineering, Vol. SE-13, No.2. February, 1987. DOI: https://doi.org/10.1109/TSE.1987.232894

Heberlein, L. etal. "A Network Security Monitor." Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy, May 1990, pp. 296-303. DOI: https://doi.org/10.1109/RISP.1990.63859

H. Debar, M. Dacier, and A. Wespi, "A revised taxonomy for intrusion detection systems," in Annales des télécommunications, 2000, vol. 55, no. 7–8, pp. 361–378 DOI: https://doi.org/10.1007/BF02994844

Justin Lee, Stuart Moskovics, Lucas Silacci, “A Survey of Intrusion Detection Analysis Methods,” CSE 221, University of California, San Diego, Spring 1999.

KDDCup1999: http://kdd.ics.uci.edu/databases.

Khraisat A, Gondal I, Vamplew P. ‘An anomaly intrusion detection system using C5 decision tree classifier’, 2018, Springer International Publishing, Cham, pp 149–155 DOI: https://doi.org/10.1007/978-3-030-04503-6_14

Kreibich C, Crowcroft J, ‘creating intrusion detection signatures using honeypots’,2004, SIGCOMM Comput Commun Rev 34(1):51–56. DOI: https://doi.org/10.1145/972374.972384

Liao H-J , Lin C-HR, Lin Y-C, Tung K-Y,‘Intrusion detection system: a comprehensive review’.2013b, J Netw Comput Appl 36(1):16–24 DOI: https://doi.org/10.1016/j.jnca.2012.09.004

M. Ahmed , A. Naser Mahmood, and J. Hu, "A survey of network anomaly detection techniques," J Netw Comput Appl, vol. 60, pp. 19–31, 1// 2016 DOI: https://doi.org/10.1016/j.jnca.2015.11.016

Muhammad Nouman [Nafees], Neetesh Saxena, Álvaro A. Cárdenas, Santiago Grijalva, Pete Burnap. "Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review". ACM Computing Surveys, 2022.

Patcha, A., & Park, J. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12),2007. DOI: https://doi.org/10.1016/j.comnet.2007.02.001

S. Kiran, "Exploring a novel approach for providing software security using soft computing systems", International Journal of Security and Its Applications, Vol. 2, 2008.

S. Alexander, "An anomaly intrusion detection system based on intelligent user recognition", Ph.D. Thesis, Faculty of Information Technology, University of Jyväskylä, Finland, 2002.

Symantec, "Internet security threat report 2017," April, 7017 2017, vol. 22 Available: https://www.symantec.com/content/dam/symantec/docs/reports/ istr-22-2017-en.pdf

S. Axelsson, "Intrusion detection systems: a survey and taxonomy," technical report 2000

S. -i. Kim, N. Nwanze, W. Edmonds, B. Johnson and P. Field, "On network intrusion detection for deployment in the wild," 2012 IEEE Network Operations and Management Symposium, Maui, HI, USA, 2012, pp. 253-260. DOI: https://doi.org/10.1109/NOMS.2012.6211906

Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, Anna Kobusińska. "A Survey on Intrusion Detection Systems for Fog and Cloud Computing". Future Internet, 2022, https://doi.org/10.3390/fi14030089 DOI: https://doi.org/10.3390/fi14030089

Young S. and Aitel D., The hacker's handbook: the strategy behind breaking into and defending networks. CRC Press, 2003.

Yang W., Wan W., Guo L. and Zhang L.J., "An Efficient Intrusion Detection Model Based on Fast Inductive Learning", Internation Conference on Machine Learning and Cybernetics.

Article Details

How to Cite

A Review of Intrusion Detection System: Methodology, Classification . (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(4), 366-373. https://doi.org/10.51583/IJLTEMAS.2025.140400039