Satinderpal Singh,
Sunny Arora,
Sushil Kamboj,
- Research Scholar, Department of Computer Science and Engineering, Guru Kashi University, Talwandi Sabo, Bathinda, Punjab, India
- Professor, Department of Computer Science and Engineering, Guru Kashi University, Talwandi Sabo, Bathinda, Punjab, India
- Professor, Department of Computer Science and Engineering, Chandigarh Group of Colleges, Landran, Punjab, India
Abstract
In the fast-changing world of cybersecurity, Intrusion Detection Systems (IDS) play a vital role in protecting digital resources. This study offers an in-depth comparative analysis to evaluate the efficiency and performance of different IDS solutions. It examines a variety of both commercial and opensource platforms, encompassing signature based, anomaly based, and hybrid models, to assess their effectiveness in identifying and responding to a wide range of cyber threats. Methodologies for testing and benchmarking IDS effectiveness, such as using standardized datasets and real-world attack scenarios, are explored. Additionally, Key performance indicators such as detection rates, false alarms, and resource utilization are considered to provide insights into the practical applicability of each IDS solution. The findings of this study aim to assist cybersecurity practitioners and decisionmakers in selecting the most suitable IDS for their specific organizational needs, ultimately enhancing overall cyber defense strategies.
Keywords: Intrusion Detection Systems (IDS), cybersecurity, anomaly detection, signature-based detection, IDS performance evaluation
[This article belongs to International Journal of Information Security Engineering ]
Satinderpal Singh, Sunny Arora, Sushil Kamboj. Comprehensive Comparative Analysis of Intrusion Detection Systems: Evaluating Signature Based, Anomaly Based, and Hybrid Approaches. International Journal of Information Security Engineering. 2025; 03(02):39-44.
Satinderpal Singh, Sunny Arora, Sushil Kamboj. Comprehensive Comparative Analysis of Intrusion Detection Systems: Evaluating Signature Based, Anomaly Based, and Hybrid Approaches. International Journal of Information Security Engineering. 2025; 03(02):39-44. Available from: https://journals.stmjournals.com/ijise/article=2025/view=233252
References
- Ye N, Emran SM, Chen Q, Vilbert S. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans Comput. 2002 Aug 7; 51(7): 810–20.
- Hu J, Yu X, Qiu D, Chen HH. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection. IEEE Netw. 2009 Mar 24; 23(1): 42–7.
- Tartakovsky AG, Rozovskii BL, Blazek RB, Kim H. A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Trans Signal Process. 2006 Sep 30; 54(9): 3372–82.
- Paschalidis IC, Smaragdakis G. Spatio-temporal network anomaly detection by assessing deviations of empirical measures. IEEE/ACM Trans Netw. 2008 Sep 9; 17(3): 685–97.
- Hu W, Hu W, Maybank S. Adaboost-based algorithm for network intrusion detection. IEEE Trans Syst Man Cybern B (Cybernetics). 2008 Mar 7; 38(2): 577–83.
- Gupta KK, Nath B, Kotagiri R. Layered approach using conditional random fields for intrusion detection. IEEE Trans Dependable Secure Comput. 2008 Jun 10; 7(1): 35–49.
- Mehdi M, Zair S, Anou A, Bensebti M. A bayesian networks in intrusion detection systems. Journal of Computer Science (JCS). 2007 May; 3(5): 259–65.
- Anbalagan E, Puttamadappa C, Mohan E, Jayaraman B, Madane S. Datamining and intrusion detection using back-propagation algorithm for intrusion detection. Int J Soft Comput. 2008; 3(4): 264–70.
- Panda M, Patra MR. Ensemble voting system for anomaly based network intrusion detection. International Journal of Recent Trends in Engineering (IJRTE). 2009 Nov 1; 2(5): 8–13.
- Ryan J, Lin MJ, Miikkulainen R. Intrusion detection with neural networks. Adv Neural Inf Process Syst. 1997; 10: 993–949.
- Panda M, Patra mr. Some clustering algorithms to enhance the performance of the network intrusion detection system. Estud Econ Apl. 2008 Aug 1; 26(2): 795.
- Jiang H, Ruan J. The application of genetic neural network in network intrusion detection. J Comput. 2009 Dec; 4(12): 1223–30.
- Ghali NI. Feature selection for effective anomaly-based intrusion detection. International Journal of Computer Science and Network Security (IJCSNS). 2009 Mar; 9(3): 285–9.
- Srivatsa S. Detecting and preventing attacks using network intrusion detection systems. Int J Comput Sci Secur. 2008; 2(1): 49–60.
- Selvakani S, Rajesh RS. Genetic Algorithm for framing rules for Intrusion Detection. International Journal of Computer Science and Network Security (IJCSNS). 2007 Nov; 7(11): 285–90.
- Venkatachalam V, Selvan S. Performance comparison of intrusion detection system classifiers using various feature reduction techniques. International Journal of Simulation. 2008 Feb; 9(1): 30–9.
- Han SJ, Cho SB. Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans Syst Man Cybern B (Cybernetics). 2006 Jun 30; 36(3): 559–70.

International Journal of Information Security Engineering
| Volume | 03 |
| Issue | 02 |
| Received | 22/04/2025 |
| Accepted | 07/07/2025 |
| Published | 24/07/2025 |
| Publication Time | 93 Days |
Login
PlumX Metrics