Flow-Based Intrusion Detection Systems: A Survey

被引:1
|
作者
Al-Bakaa, Aliaa [1 ]
Al-Musawi, Bahaa [1 ]
机构
[1] Univ Kufa, Fac Engn, Najaf, Iraq
关键词
Intrusion detection; Datasets; IoT security; Network Intrusion Detection System; Real-time detection; ALGORITHM; DATASET;
D O I
10.1007/978-981-19-1166-8_10
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
After developing IoT devices, information security takes a critical role than any other period. Most IoT devices use weak passwords, insecure interface, poor management, and lack of patches and updates mechanism. To that end, researchers have used different techniques for building a system that can detect intrusions and ensure secured systems. This paper explored the most common types of attacks that threaten networks. Besides, it provides an overview of the existing datasets that researchers can use as benchmark datasets for evaluating their proposed approaches. Furthermore, we review the most significant works during the last ten years that have been introduced for building flow-based intrusion detection systems.
引用
收藏
页码:121 / 137
页数:17
相关论文
共 50 条
  • [1] FlowTransformer: A transformer framework for flow-based network intrusion detection systems
    Manocchio, Liam Daly
    Layeghy, Siamak
    Lo, Wai Weng
    Kulatilleke, Gayan K.
    Sarhan, Mohanad
    Portmann, Marius
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 241
  • [2] Automated Flow-based Rule Generation for Network Intrusion Detection Systems
    Fallahi, Naser
    Sami, Ashkan
    Tajbakhsh, Morteza
    [J]. 2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
  • [3] Flow-based intrusion detection: Techniques and challenges
    Umer, Muhammad Fahad
    Sher, Muhammad
    Bi, Yaxin
    [J]. COMPUTERS & SECURITY, 2017, 70 : 238 - 254
  • [4] An Overview of IP Flow-Based Intrusion Detection
    Sperotto, Anna
    Schaffrath, Gregor
    Sadre, Ramin
    Morariu, Cristian
    Pras, Aiko
    Stiller, Burkhard
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (03): : 343 - 356
  • [5] Flow-Based Intrusion Detection System for SDN
    Ajaeiya, Georgi A.
    Adalian, Nareg
    Elhajj, Imad H.
    Kayssi, Ayman
    Chehab, Ali
    [J]. 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 787 - 793
  • [6] SSHCure: A Flow-Based SSH Intrusion Detection System
    Hellemons, Laurens
    Hendriks, Luuk
    Hofstede, Rick
    Sperotto, Anna
    Sadre, Ramin
    Pras, Aiko
    [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 86 - 97
  • [7] Clustering and Neural Visualization for Flow-Based Intrusion Detection
    Sanchez, Raul
    Herrero, Alvaro
    Corchado, Emilio
    [J]. INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 333 - 345
  • [8] A Labeled Data Set for Flow-Based Intrusion Detection
    Sperotto, Anna
    Sadre, Ramin
    van Vliet, Frank
    Pras, Aiko
    [J]. IP OPERATIONS AND MANAGEMENT, PROCEEDINGS, 2009, 5843 : 39 - 50
  • [9] A flow-based intrusion detection framework for internet of things networks
    Santos, Leonel
    Goncalves, Ramiro
    Rabadao, Carlos
    Martins, Jose
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 37 - 57
  • [10] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399