EN
Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems
Abstract
Recently, Advanced Persistent Threat (APT) has emerged as sophisticated and tailor-made attacks. APTs pose threats mainly targeting institutions such as military, defense and security infrastructure, high profile companies and governments etc. Particularly as a counter measure for APT attacks done by hactivists and cyber warriors and cyber terrorists over government institutions and e-government applications intrusion detection mechanisms are of crucial importance in effective defense. In this study, Intrusion detection and prevention systems have been studied in detail after being referred to the tasks and abilities of the intrusion detection systems that are at the core of the computer security technology presented today in order to meet the increasing need for information and network security. This paper’s aim is the specifying the differences between Host Based Intrusion Detection Systems (HIDS) and Network Based Intrusion Detection Systems (NIDS) and compares the tools which are using HIDS and NIDS. It is asserted that in order to have a better assurance for APT attacks there should be set up a Hybrid IDS approach covering both networks and hosts using both signature and behavioral detection mechanism based on machine learning.
Keywords
References
- [1]. Bahman Nikkhahan, Akbar Jangi Aghdam, and Sahar Sohrabi, “E-government security: A honeynet approach”, International Journal of Advanced Science and Technology Volume 5, April, 2009 http://www.sersc.org/journals/IJAST/vol5/5.pdf
- [2]. Niva Das, Tanmoy Sarkar, “Survey on Host and Network Based Intrusion Detection System” Department of Information Technology, University of Calcutta, Kolkata Email: niva.cu@gmail.com Int. J. Advanced Networking and Applications Volume: 6 Issue: 2 Pages: 2266-2269 (2014) ISSN : 0975-0290
- [3]. Yousef Farhaoui, Ahmed Asimi, “Creating a Complete Model of an Intrusion Detection System effective on the LAN” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 5, 2012
- [4]. Zhitian Zhou, Congyang Hu, “Study on the E-government Security Risk Management”, International Journal of Computer Science and Network Security, VOL.8 No.5, May 2008 Manuscript received May 5, 2008 Manuscript revised May 20, 2008
- [5]. Wallner R., Intrusion Detection Systems, 2007, http://www.kiv.zcu.cz/~ledvina/DHT/tugraz/IDS.pdf
- [6]. S. Young and D. Aitel, The hacker’s handbook: the strategy behind breaking into and defending networks. CRC Press, 2003.
- [7]. K. Timm, “Strategies to reduce false positives and false negatives in nids,” Tech. Rep., Access Date 10 Oct, 2015. [Online]. Available: http://www.symantec.com/connect/articles/strategies-reduce-false-positives-and-false-negatives-nids .
- [8]. K. Julisch and M. Dacier, “Mining intrusion detection alarms for actionable knowledge,” in Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining-KDD 02. Association for Computing Machinery (ACM), 2002.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Editorial
Publication Date
March 25, 2022
Submission Date
November 27, 2020
Acceptance Date
January 24, 2022
Published in Issue
Year 2022 Volume: 18 Number: 1
APA
Efe, A., & Abacı, İ. N. (2022). Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. Celal Bayar University Journal of Science, 18(1), 23-32. https://doi.org/10.18466/cbayarfbe.832533
AMA
1.Efe A, Abacı İN. Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. CBUJOS. 2022;18(1):23-32. doi:10.18466/cbayarfbe.832533
Chicago
Efe, Ahmet, and İrem Nur Abacı. 2022. “Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems”. Celal Bayar University Journal of Science 18 (1): 23-32. https://doi.org/10.18466/cbayarfbe.832533.
EndNote
Efe A, Abacı İN (March 1, 2022) Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. Celal Bayar University Journal of Science 18 1 23–32.
IEEE
[1]A. Efe and İ. N. Abacı, “Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems”, CBUJOS, vol. 18, no. 1, pp. 23–32, Mar. 2022, doi: 10.18466/cbayarfbe.832533.
ISNAD
Efe, Ahmet - Abacı, İrem Nur. “Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems”. Celal Bayar University Journal of Science 18/1 (March 1, 2022): 23-32. https://doi.org/10.18466/cbayarfbe.832533.
JAMA
1.Efe A, Abacı İN. Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. CBUJOS. 2022;18:23–32.
MLA
Efe, Ahmet, and İrem Nur Abacı. “Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems”. Celal Bayar University Journal of Science, vol. 18, no. 1, Mar. 2022, pp. 23-32, doi:10.18466/cbayarfbe.832533.
Vancouver
1.Ahmet Efe, İrem Nur Abacı. Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. CBUJOS. 2022 Mar. 1;18(1):23-32. doi:10.18466/cbayarfbe.832533