IT security and Intrusion Detection Systems: an Introduction

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 5, 2024 at 2:47 pm | [if 1553 equals=””] Volume :15 [else] Volume :15[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Seyfali Mahini

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Lecturer, Department of computer science, Islamic Azad University, Khoy Branch, Khoy, Iran
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nThis scientific article deals with the current status of IT security in an industrialized country and one of the many approaches. The emphasis is on what are known as Intrusion Detection Systems. These enable users to detect suspicious behavior and attacks in daily IT operations by analyzing data, resources and network flows. Based on previous research, the different variants, available detection types and their working methods are briefly explained and presented. The primary emphasis should be on understanding the functioning of the systems, their applications, and the constraints that govern them. The aim of the work is to select a suitable intrusion detection system for a hypothetical university such as SafeUni, its data center and the computer labs. This will be done after the mediation of the basics, an abbreviated requirements analysis is presented and the selected Intrusion Detection System, which best meets the requirements, is presented. The final stage involves summarizing the discovered information.

n

n

n

Keywords: IT security, intrusion detection system, host-based, network-based, hybrid systems, signature-based, anomaly-based.

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Computer Technology & Applications(jocta)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Computer Technology & Applications(jocta)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Seyfali Mahini IT security and Intrusion Detection Systems: an Introduction jocta April 5, 2024; 15:-

n

How to cite this URL: Seyfali Mahini IT security and Intrusion Detection Systems: an Introduction jocta April 5, 2024 {cited April 5, 2024};15:-. Available from: https://journals.stmjournals.com/jocta/article=April 5, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘jocta’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

[1] Jang-Jaccard J, Nepal S. A survey of emerging threats in cybersecurity. Journal of computer and system sciences. 2014 Aug 1;80(5):973-93.

[2]Brooks DJ, Coole MP. Intrusion Detection Systems. InEncyclopedia of Security and Emergency Management 2021 Jun 9 (pp. 490-494). Cham: Springer International Publishing.‌

[3]Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019 Dec;2(1):1-22.

[4]Kim K, Aminanto ME, Tanuwidjaja HC. Network intrusion detection using deep learning: a feature learning approach. Springer; 2018 Sep 25.

[5] van Oorschot PC. Computer Security and the Internet. Springer International Publishing; 2020.

[6] Cid D, Hay A, Bray R. OSSEC host-based intrusion detection guide. Syngress; 2008 Apr 9.

[7] Kraft P, Weyert A. Network Hacking: ProfessionelleAngriffs-und Verteidigungstechnikengegen Hacker und Datendiebe. Franzis Verlag; 2017 Apr 25.

[8] Shukla P, Kumar S. Learning Elastic Stack 7.0: Distributed Search, Analytics, and Visualization Using Elasticsearch, Logstash, Beats, and Kibana. Packt Publishing Ltd; 2019 May 31.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal of Computer Technology & Applications

n

[if 344 not_equal=””]ISSN: 2229-6964[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 15
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received December 22, 2023
Accepted February 21, 2024
Published April 5, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]