Aditya Nur Cahyo, Anny Kartika Sari, M. Riasetiawan
{"title":"混合入侵检测系统的比较","authors":"Aditya Nur Cahyo, Anny Kartika Sari, M. Riasetiawan","doi":"10.1109/ICITEE49829.2020.9271727","DOIUrl":null,"url":null,"abstract":"IDS have an important role in dispelling and preventing an intrusion or abuse of access rights. In its development, research on IDS is growing. IDS consist of several detection models, one of which is hybrid-based, which in IDS detection combines the signature and anomaly models. This method is considered more effective because it combines the advantages of the speed of signature detection and the ability to analyze new attacks from the anomaly model. However, from existing models and frameworks hybrid-based IDS still needs to be further developed to be implemented in the industry. From a number of existing IDS-based studies, this paper intends to conduct a review with the aim that researchers who wish to develop hybrid-based IDS know which methods and architecture are best to be implemented. This paper reviews hybrid IDS research in the last five years.","PeriodicalId":245013,"journal":{"name":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Comparison of Hybrid Intrusion Detection System\",\"authors\":\"Aditya Nur Cahyo, Anny Kartika Sari, M. Riasetiawan\",\"doi\":\"10.1109/ICITEE49829.2020.9271727\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IDS have an important role in dispelling and preventing an intrusion or abuse of access rights. In its development, research on IDS is growing. IDS consist of several detection models, one of which is hybrid-based, which in IDS detection combines the signature and anomaly models. This method is considered more effective because it combines the advantages of the speed of signature detection and the ability to analyze new attacks from the anomaly model. However, from existing models and frameworks hybrid-based IDS still needs to be further developed to be implemented in the industry. From a number of existing IDS-based studies, this paper intends to conduct a review with the aim that researchers who wish to develop hybrid-based IDS know which methods and architecture are best to be implemented. This paper reviews hybrid IDS research in the last five years.\",\"PeriodicalId\":245013,\"journal\":{\"name\":\"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITEE49829.2020.9271727\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITEE49829.2020.9271727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IDS have an important role in dispelling and preventing an intrusion or abuse of access rights. In its development, research on IDS is growing. IDS consist of several detection models, one of which is hybrid-based, which in IDS detection combines the signature and anomaly models. This method is considered more effective because it combines the advantages of the speed of signature detection and the ability to analyze new attacks from the anomaly model. However, from existing models and frameworks hybrid-based IDS still needs to be further developed to be implemented in the industry. From a number of existing IDS-based studies, this paper intends to conduct a review with the aim that researchers who wish to develop hybrid-based IDS know which methods and architecture are best to be implemented. This paper reviews hybrid IDS research in the last five years.