Nature Inspired Techniques and Applications in Intrusion Detection Systems: Recent Progress and Updated Perspective
- PDF / 1,152,844 Bytes
- 23 Pages / 595.276 x 790.866 pts Page_size
- 14 Downloads / 171 Views
ORIGINAL PAPER
Nature Inspired Techniques and Applications in Intrusion Detection Systems: Recent Progress and Updated Perspective Kutub Thakur1 · Gulshan Kumar2 Received: 1 January 2020 / Accepted: 20 August 2020 © CIMNE, Barcelona, Spain 2020
Abstract Nowadays, it has become a necessity for operational and reliable operation of networks due to our increased dependency over the network services. However, intruders are continuously attempting to break into the networks and disturbing the network services using a variety of attack vectors and technologies. This motivates us to develop the techniques that ensure operational and reliable network, even in changing scenarios. Recently, most of the researchers have focused on the employment of techniques inspired by a natural phenomenon to detect the intrusions effectively. Nature-Inspired Techniques (NITs) have the ability to adapt to a constantly changing environment. Thus, they help to provide in-built resiliency to failures and damages, collaborative, survivable, self-organizing and self-healing capabilities to IDSs. The paper presents an analysis of NITs, and their classification based on the source of their inspiration. A comprehensive review of various NITs employed in intrusion detection is presented. Analysis of prominent research indicates that NITs based IDSs offers high detection rate and low false positive rate in comparison to the conventional IDSs. The NITs enables more flexibility in IDSs because of their employability into hybrid IDSs leading to detection on the basis of anomalies as well as signatures, leading in improving detection results of known and unknown attacks. The paper attempts to identify NITs’ advantages, disadvantages and significant challenges to the successful implementation of NITs in the intrusion detection area. The main intention of this paper is to explore and present a comprehensive review of the application of NITs in intrusion detection, covering a variety of NITs, study of the techniques and architectures used and further the contribution of NITs in the field of intrusion detection. Finally, the paper ends with the conclusion and future aspects.
1 Introduction Several techniques and technologies such as firewalls, encryption, secure network protocols have been employed for restricting the unauthorized use of computer systems. With the evolution of security technologies, the attackers are also continuing to adopt new techniques for breaking the security of computer systems. In addition to the ever-changing attacker techniques, new network types like MANET, WSN, SDN have appeared that lead to a more complicated situation of ensuring computer systems’ security. These new * Gulshan Kumar [email protected] Kutub Thakur [email protected] 1
Department of Professional Security Studies, New Jersey City University, Jersey City, USA
Department of Computer Applications, Shaheed Bhagat Singh State Technical Campus, Ferozepur, Punjab, India
2
types of network are not designed by keeping security into considerations. Most of
Data Loading...