Abstract

Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods

Highlights

  • In the context of information systems, an intrusion can be defined as any attempt to gain unauthorised access and potentially cause damage to any given system

  • Recent research in anomaly-based host-based intrusion detection systems (HIDS) algorithms has focused on the application of Neural Networks (NNs) and Deep Learning (DL) algorithms with the purpose of system call language-modelling in order to predict if a sequence of system calls is normal or anomalous

  • The authors attempt to tackle the problem of high false-alarm rates by using an ensemble method of multiple thresholding classifiers, using the rectified linear units (ReLU) method.[25]. They compare three LSTM solutions with a k-nearest neighbour and a k-means clustering classifier, and the results show the superiority of their method

Read more

Summary

Introduction

In the context of information systems, an intrusion can be defined as any attempt to gain unauthorised access and potentially cause damage to any given system This means that any attack that may pose a threat to the confidentiality, integrity, or availability of information meets the definition of an intrusion. Because the capabilities of an IDS are primarily dependent on the data that is available to it, the location of the IDS is an important architectural decision This is the main difference between network-based intrusion detection systems (NIDS) versus host-based intrusion detection systems (HIDS). Both approaches are presented, albeit the latter are the ones that we mainly focus on in this study.

Types of IDS
Anomaly-based
Recent Developments
Future Directions
Related Work
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.