Intruders and intrusion detection systems — An overview

作者: Awais Yousaf , Onaiza Yousaf

DOI: 10.1109/ECTICON.2017.8096190

关键词: Big dataNext-generation networkIntrusion detection systemElectronic warfareInternet protocol suiteInternet of ThingsComputer securityComputer networkEngineeringThe InternetInternet Protocol

摘要: With rapid advancement in telecommunication sub-domains like Internet of Things (IoT), Energy (IoE), Vehicles (IoV), Next Generation Networks (5G) and Big Data, the strength, intensity effectiveness intruders is also evolving. Intruders are ready to challenge modern domain electronic warfare. The traditional TCP/IP protocol stack does not have capability defend against threats posed by intruders, therefore, major revision, from security point view, mandatory. In this paper a brief overview provided with respect each layer stack. Advancements Intrusion Detection Systems (IDS) for detection chronological order. an unending war between parallel advancements technologies evolutions intrusion system always needed that works at covers entire spectrum threats.

参考文章(23)
Aqeel Sahi Khader, David Lai, Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol international conference on telecommunications. pp. 204- 208 ,(2015) , 10.1109/ICT.2015.7124683
George Dean Bissias, Marc Liberatore, David Jensen, Brian Neil Levine, Privacy Vulnerabilities in Encrypted HTTP Streams Privacy Enhancing Technologies. ,vol. 3856, pp. 1- 11 ,(2006) , 10.1007/11767831_1
Nikos Virvilis, Dimitris Gritzalis, The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? availability, reliability and security. pp. 248- 254 ,(2013) , 10.1109/ARES.2013.32
Marius Barat, Dumitru-Bogdan Prelipcean, Dragoş Teodor Gavriluţ, None, A study on common malware families evolution in 2012 Journal of Computer Virology and Hacking Techniques. ,vol. 9, pp. 171- 178 ,(2013) , 10.1007/S11416-013-0192-5
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig, Intrusion Detection for Encrypted Web Accesses advanced information networking and applications. ,vol. 1, pp. 569- 576 ,(2007) , 10.1109/AINAW.2007.212
Ralph Langner, Stuxnet: Dissecting a Cyberwarfare Weapon IEEE Security & Privacy Magazine. ,vol. 9, pp. 49- 51 ,(2011) , 10.1109/MSP.2011.67
Sang Gyun Kim, Jong Sun Park, Legal limits of search and seizure for digital forensic in Korea Journal of Computer Virology and Hacking Techniques. ,vol. 10, pp. 157- 163 ,(2014) , 10.1007/S11416-014-0212-0
K Vishnu, A new kind of transport layer attack in wireless Ad Hoc Networks wireless communications, networking and information security. pp. 198- 201 ,(2010) , 10.1109/WCINS.2010.5541733