Abstract
Nowadays, network technologies are essential for transferring and storing various information of users, companies, and industries. However, the growth of the information transfer rate expands the attack surface, offering a rich environment to intruders. Intrusion detection systems (IDSs) are widespread systems able to passively or actively control intrusive activities in a defined host and network perimeter. Recently, different IDSs have been proposed by integrating various detection techniques, generic or adapted to a specific domain and to the nature of attacks operating on. The cybersecurity landscape deals with tremendous diverse event streams that exponentially increase the attack vectors. Event stream processing (ESP) methods appear to be solutions that leverage event streams to provide actionable insights and faster detection. In this paper, we briefly describe domains (as well as their vulnerabilities) on which recent papers were-based. We also survey standards for vulnerability assessment and attack classification. Afterwards, we carry out a classification of IDSs, evaluation metrics, and datasets. Next, we provide the technical details and an evaluation of the most recent work on IDS techniques and ESP approaches covering different dimensions (axes): domains, architectures, and local communication technologies. Finally, we discuss challenges and strategies to improve IDS in terms of accuracy, performance, and robustness.
| Original language | English |
|---|---|
| Article number | 8735821 |
| Pages (from-to) | 3639-3681 |
| Number of pages | 43 |
| Journal | IEEE Communications Surveys and Tutorials |
| Volume | 21 |
| Issue number | 4 |
| DOIs | |
| Publication status | Published - 1 Oct 2019 |
| Externally published | Yes |
Keywords
- Intrusion detection systems
- attack classification
- datasets
- event stream processing
- intrusion detection techniques
- vulnerabilities
- vulnerability assessment