Editoryal

Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems

Cilt: 18 Sayı: 1 25 Mart 2022
PDF İndir
EN

Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems

Öz

Recently, Advanced Persistent Threat (APT) has emerged as sophisticated and tailor-made attacks. APTs pose threats mainly targeting institutions such as military, defense and security infrastructure, high profile companies and governments etc. Particularly as a counter measure for APT attacks done by hactivists and cyber warriors and cyber terrorists over government institutions and e-government applications intrusion detection mechanisms are of crucial importance in effective defense. In this study, Intrusion detection and prevention systems have been studied in detail after being referred to the tasks and abilities of the intrusion detection systems that are at the core of the computer security technology presented today in order to meet the increasing need for information and network security. This paper’s aim is the specifying the differences between Host Based Intrusion Detection Systems (HIDS) and Network Based Intrusion Detection Systems (NIDS) and compares the tools which are using HIDS and NIDS. It is asserted that in order to have a better assurance for APT attacks there should be set up a Hybrid IDS approach covering both networks and hosts using both signature and behavioral detection mechanism based on machine learning.

Anahtar Kelimeler

Kaynakça

  1. [1]. Bahman Nikkhahan, Akbar Jangi Aghdam, and Sahar Sohrabi, “E-government security: A honeynet approach”, International Journal of Advanced Science and Technology Volume 5, April, 2009 http://www.sersc.org/journals/IJAST/vol5/5.pdf
  2. [2]. Niva Das, Tanmoy Sarkar, “Survey on Host and Network Based Intrusion Detection System” Department of Information Technology, University of Calcutta, Kolkata Email: niva.cu@gmail.com Int. J. Advanced Networking and Applications Volume: 6 Issue: 2 Pages: 2266-2269 (2014) ISSN : 0975-0290
  3. [3]. Yousef Farhaoui, Ahmed Asimi, “Creating a Complete Model of an Intrusion Detection System effective on the LAN” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 5, 2012
  4. [4]. Zhitian Zhou, Congyang Hu, “Study on the E-government Security Risk Management”, International Journal of Computer Science and Network Security, VOL.8 No.5, May 2008 Manuscript received May 5, 2008 Manuscript revised May 20, 2008
  5. [5]. Wallner R., Intrusion Detection Systems, 2007, http://www.kiv.zcu.cz/~ledvina/DHT/tugraz/IDS.pdf
  6. [6]. S. Young and D. Aitel, The hacker’s handbook: the strategy behind breaking into and defending networks. CRC Press, 2003.
  7. [7]. K. Timm, “Strategies to reduce false positives and false negatives in nids,” Tech. Rep., Access Date 10 Oct, 2015. [Online]. Available: http://www.symantec.com/connect/articles/strategies-reduce-false-positives-and-false-negatives-nids .
  8. [8]. K. Julisch and M. Dacier, “Mining intrusion detection alarms for actionable knowledge,” in Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining-KDD 02. Association for Computing Machinery (ACM), 2002.

Ayrıntılar

Birincil Dil

İngilizce

Konular

Mühendislik

Bölüm

Editoryal

Yayımlanma Tarihi

25 Mart 2022

Gönderilme Tarihi

27 Kasım 2020

Kabul Tarihi

24 Ocak 2022

Yayımlandığı Sayı

Yıl 2022 Cilt: 18 Sayı: 1

Kaynak Göster

APA
Efe, A., & Abacı, İ. N. (2022). Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. Celal Bayar University Journal of Science, 18(1), 23-32. https://doi.org/10.18466/cbayarfbe.832533
AMA
1.Efe A, Abacı İN. Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. Celal Bayar University Journal of Science. 2022;18(1):23-32. doi:10.18466/cbayarfbe.832533
Chicago
Efe, Ahmet, ve İrem Nur Abacı. 2022. “Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems”. Celal Bayar University Journal of Science 18 (1): 23-32. https://doi.org/10.18466/cbayarfbe.832533.
EndNote
Efe A, Abacı İN (01 Mart 2022) Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. Celal Bayar University Journal of Science 18 1 23–32.
IEEE
[1]A. Efe ve İ. N. Abacı, “Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems”, Celal Bayar University Journal of Science, c. 18, sy 1, ss. 23–32, Mar. 2022, doi: 10.18466/cbayarfbe.832533.
ISNAD
Efe, Ahmet - Abacı, İrem Nur. “Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems”. Celal Bayar University Journal of Science 18/1 (01 Mart 2022): 23-32. https://doi.org/10.18466/cbayarfbe.832533.
JAMA
1.Efe A, Abacı İN. Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. Celal Bayar University Journal of Science. 2022;18:23–32.
MLA
Efe, Ahmet, ve İrem Nur Abacı. “Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems”. Celal Bayar University Journal of Science, c. 18, sy 1, Mart 2022, ss. 23-32, doi:10.18466/cbayarfbe.832533.
Vancouver
1.Ahmet Efe, İrem Nur Abacı. Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems. Celal Bayar University Journal of Science. 01 Mart 2022;18(1):23-32. doi:10.18466/cbayarfbe.832533

Cited By