{"title":"入侵检测:综述","authors":"","doi":"10.58496/mjcs/2021/001","DOIUrl":null,"url":null,"abstract":"Due to the processes involved in the electronic transformation of data, computer systems, and the Internet have led to significant security, privacy, and confidentiality issues in recent years. Intrusion detection systems (IDSs) are one of the most promising data and network protection tools; there are many approaches and techniques used for the detection of intrusions based on the intrusion type; in this paper, different types of intrusions are reviewed, and the different kinds of systems for detecting intrusions, challenges and future directions for researchers determined at the end of this paper.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Intrusion Detection: A Review\",\"authors\":\"\",\"doi\":\"10.58496/mjcs/2021/001\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the processes involved in the electronic transformation of data, computer systems, and the Internet have led to significant security, privacy, and confidentiality issues in recent years. Intrusion detection systems (IDSs) are one of the most promising data and network protection tools; there are many approaches and techniques used for the detection of intrusions based on the intrusion type; in this paper, different types of intrusions are reviewed, and the different kinds of systems for detecting intrusions, challenges and future directions for researchers determined at the end of this paper.\",\"PeriodicalId\":369414,\"journal\":{\"name\":\"Mesopotamian Journal of Cyber Security\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mesopotamian Journal of Cyber Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58496/mjcs/2021/001\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mesopotamian Journal of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58496/mjcs/2021/001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Due to the processes involved in the electronic transformation of data, computer systems, and the Internet have led to significant security, privacy, and confidentiality issues in recent years. Intrusion detection systems (IDSs) are one of the most promising data and network protection tools; there are many approaches and techniques used for the detection of intrusions based on the intrusion type; in this paper, different types of intrusions are reviewed, and the different kinds of systems for detecting intrusions, challenges and future directions for researchers determined at the end of this paper.