Insider Intrusion Detection Techniques: A State-of-the-Art Review

被引:1
|
作者
Nisha, T. N. [1 ,2 ]
Pramod, Dhanya [1 ]
机构
[1] Deemed Univ SIU, Symbiosis Ctr Informat Technol SCIT, Constituent Symbiosis Int, Pune, India
[2] Symbiosis Ctr Informat Technol SCIT, Symbiosis Infotech Campus, Plot 15, Phase I, Rajiv Gandhi InfoTech Pk, Pune 411057, Maharashtra, India
关键词
Insider attacks; signature and anomaly-based detection; profiling-based detection; event-based intrusion detection; sequence of events; ATTACK DETECTION; COMPUTER INTRUSION; EVENT; PREDICTION; PLATFORM; SYSTEM;
D O I
10.1080/08874417.2023.2175337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study is a systematic literature review on anomaly-based intrusion detection methods specially to detect insider attacks. The focus is to enumerate the techniques for modeling host-based and network-based anomaly detection. By leveraging the sequential characteristics of network data, we further discuss the concept of event-based intrusion detection. The research starts with a bibliometric analysis of the broader topic. The PRISMA methodology is implemented to analyze papers selected after the primary search. This study revolves around four research questions formed to serve the purpose defined. The study unveils the opportunity of event-based models in insider intrusion detection and identifies the possibility of a combined model to detect insiders as early as possible. The study recommends incorporating the strengths of anomaly-based, signature-based and knowledge-based models to detect the attacks proactively.
引用
收藏
页码:106 / 123
页数:18
相关论文
共 50 条
  • [1] A Review on State-of-the-Art Violence Detection Techniques
    Ramzan, Muhammad
    Abid, Adnan
    Khan, Hikmat Ullah
    Awan, Shahid Mahmood
    Ismail, Amina
    Ahmed, Muzamil
    Ilyas, Mahwish
    Mahmood, Ahsan
    [J]. IEEE ACCESS, 2019, 7 : 107560 - 107575
  • [2] Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
    Wu, Wufei
    Joloudari, Javad Hassannataj
    Jagatheesaperumal, Senthil Kumar
    Rajesh, Kandala N. V. P. S.
    Gaftandzhieva, Silvia
    Hussain, Sadiq
    Rabih, Rahimullah
    Haqjoo, Najibullah
    Nazar, Mobeen
    Vahdat-Nejad, Hamed
    Doneva, Rositsa
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 2785 - 2813
  • [3] Introduction to state-of-the-art intrusion detection technologies
    Bilar, D
    Burroughs, D
    [J]. ENABLING TECHNOLOGIES FOR LAW ENFORCEMENT AND SECURITY, 2000, 4232 : 123 - 133
  • [4] Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey
    Mouhammd Alkasassbeh
    Sherenaz Al-Haj Baddar
    [J]. Arabian Journal for Science and Engineering, 2023, 48 : 10021 - 10064
  • [5] Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey
    Alkasassbeh, Mouhammd
    Baddar, Sherenaz Al-Haj
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (08) : 10021 - 10064
  • [6] Advances and Challenges in Drone Detection and Classification Techniques: A State-of-the-Art Review
    Seidaliyeva, Ulzhalgas
    Ilipbayeva, Lyazzat
    Taissariyeva, Kyrmyzy
    Smailov, Nurzhigit
    Matson, Eric T.
    [J]. SENSORS, 2024, 24 (01)
  • [7] A State-of-the-Art Review of Machine Learning Techniques for Fraud Detection Research
    Sinayobye, Janvier Omar
    Kiwanuka, Fred
    Kaawaase Kyanda, Swaib
    [J]. 2018 IEEE/ACM SYMPOSIUM ON SOFTWARE ENGINEERING IN AFRICA (SEIA), 2018, : 11 - 19
  • [8] State-of-the-art techniques for passive image forgery detection: a brief review
    Kaur, Simranjot
    Sharma, Nonita
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (05) : 456 - 473
  • [9] A Survey on State-of-the-Art Drowsiness Detection Techniques
    Ramzan, Muhammad
    Khan, Hikmat Ullah
    Awan, Shahid Mahmood
    Ismail, Amina
    Ilyas, Mahwish
    Mahmood, Ahsan
    [J]. IEEE ACCESS, 2019, 7 : 61904 - 61919
  • [10] Review of State-of-the-Art Design Techniques for Chatbots
    Agarwal R.
    Wadhwa M.
    [J]. SN Computer Science, 2020, 1 (5)