Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security

Descripción del Articulo

The study primarily focuses on the analysis and comparison of intrusion detection techniques in network environments, with the objective of evaluating the impact of Intrusion Detection Systems (IDSs) on data protection. It also aims to understand how these techniques have adapted to emerging threats...

Descripción completa

Detalles Bibliográficos
Autores: Enciso Suárez, Joel Renato, Portilla Rodriguez, Jack Edinson, Mendoza de los Santos , Alberto Carlos
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Privada de Tacna
Repositorio:Revistas - Universidad Privada de Tacna
Lenguaje:español
OAI Identifier:oai:revistas.upt.edu.pe:article/840
Enlace del recurso:https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/840
Nivel de acceso:acceso abierto
Materia:Seguridad de información
protección digital
IDS
algoritmos
amenazas cibernéticas
Information security
digital protection
algorithms
cyber threats
id REVUPT_00e2e45df2f7119b25f2a51a36e1ade5
oai_identifier_str oai:revistas.upt.edu.pe:article/840
network_acronym_str REVUPT
network_name_str Revistas - Universidad Privada de Tacna
repository_id_str
spelling Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information SecurityAnálisis integral de los sistemas de detección de intrusos y sus algoritmos asociados en la seguridad de la información Enciso Suárez, Joel RenatoPortilla Rodriguez, Jack EdinsonMendoza de los Santos , Alberto CarlosSeguridad de informaciónprotección digitalIDSalgoritmosamenazas cibernéticasInformation securitydigital protectionIDSalgorithmscyber threatsThe study primarily focuses on the analysis and comparison of intrusion detection techniques in network environments, with the objective of evaluating the impact of Intrusion Detection Systems (IDSs) on data protection. It also aims to understand how these techniques have adapted to emerging threats and evaluate their effectiveness in detecting malicious activities. To achieve this, a systematic review of documents stored in the IEEE Xplore, Redalyc, and ScienceDirect databases between 2019 and 2023 was conducted. The analysis reveals that intrusion detection techniques have evolved significantly to address constantly changing cyber threats. Specifically, machine learning-based techniques and behavior analysis have proven to be effective in reducing false positives. However, to keep up to date with the threats, constant management and updating of these techniques is required. Furthermore, it has been determined that intrusion detection is crucial for cybersecurity. This is because in a rapidly evolving cyber environment where threats swiftly advance, IDSs provide critical defense by offering continuous visibility and protection against potential intrusions or malicious activities in real-time.El estudio se enfoca principalmente en el análisis y la comparación de las técnicas de detección de intrusiones en entornos de red, con el objetivo de evaluar el impacto de los sistemas de detección de intrusiones (SDI) en la protección de datos. También se busca comprender cómo estas técnicas se han adaptado a las amenazas emergentes y evaluar su eficacia en la detección de actividades maliciosas. Para lograrlo, se realizó una revisión sistemática de documentos almacenados en las bases de datos de IEEE Xplore, Redalyc y ScienceDirect entre los años 2019 y 2023. El análisis revela que las técnicas de detección de intrusiones han evolucionado de manera significativa para enfrentar las amenazas cibernéticas en constante cambio. En particular, las técnicas basadas en el aprendizaje automático y el análisis de comportamiento han demostrado ser eficaces en la reducción de falsos positivos. Sin embargo, para mantenerse al día con las amenazas, se requiere una gestión constante y la actualización de estas técnicas. Además, se ha determinado que la detección de intrusiones es crucial para la seguridad cibernética. Esto se debe a que, en un entorno cibernético en constante evolución, donde las amenazas avanzan rápidamente, los SDI ofrecen una defensa crítica al proporcionar visibilidad y protección continua contra posibles intrusiones o actividades maliciosas en tiempo real.UNIVERSIDAD PRIVADA DE TACNA2023-11-23info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdftext/htmlhttps://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/84010.47796/ing.v5i0.840INGENIERÍA INVESTIGA; Vol. 5 (2023): Ingeniería InvestigaINGENIERÍA INVESTIGA; Vol. 5 (2023): Ingeniería Investiga2708-303910.47796/ing.v5i0reponame:Revistas - Universidad Privada de Tacnainstname:Universidad Privada de Tacnainstacron:UPTspahttps://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/840/830https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/840/858Derechos de autor 2023 Joel Renato Enciso Suárez, Jack Edinson Portilla Rodriguez, Alberto Carlos Mendoza de los Santos http://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessoai:revistas.upt.edu.pe:article/8402024-04-25T14:15:08Z
dc.title.none.fl_str_mv Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security
Análisis integral de los sistemas de detección de intrusos y sus algoritmos asociados en la seguridad de la información
title Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security
spellingShingle Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security
Enciso Suárez, Joel Renato
Seguridad de información
protección digital
IDS
algoritmos
amenazas cibernéticas
Information security
digital protection
IDS
algorithms
cyber threats
title_short Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security
title_full Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security
title_fullStr Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security
title_full_unstemmed Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security
title_sort Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security
dc.creator.none.fl_str_mv Enciso Suárez, Joel Renato
Portilla Rodriguez, Jack Edinson
Mendoza de los Santos , Alberto Carlos
author Enciso Suárez, Joel Renato
author_facet Enciso Suárez, Joel Renato
Portilla Rodriguez, Jack Edinson
Mendoza de los Santos , Alberto Carlos
author_role author
author2 Portilla Rodriguez, Jack Edinson
Mendoza de los Santos , Alberto Carlos
author2_role author
author
dc.subject.none.fl_str_mv Seguridad de información
protección digital
IDS
algoritmos
amenazas cibernéticas
Information security
digital protection
IDS
algorithms
cyber threats
topic Seguridad de información
protección digital
IDS
algoritmos
amenazas cibernéticas
Information security
digital protection
IDS
algorithms
cyber threats
description The study primarily focuses on the analysis and comparison of intrusion detection techniques in network environments, with the objective of evaluating the impact of Intrusion Detection Systems (IDSs) on data protection. It also aims to understand how these techniques have adapted to emerging threats and evaluate their effectiveness in detecting malicious activities. To achieve this, a systematic review of documents stored in the IEEE Xplore, Redalyc, and ScienceDirect databases between 2019 and 2023 was conducted. The analysis reveals that intrusion detection techniques have evolved significantly to address constantly changing cyber threats. Specifically, machine learning-based techniques and behavior analysis have proven to be effective in reducing false positives. However, to keep up to date with the threats, constant management and updating of these techniques is required. Furthermore, it has been determined that intrusion detection is crucial for cybersecurity. This is because in a rapidly evolving cyber environment where threats swiftly advance, IDSs provide critical defense by offering continuous visibility and protection against potential intrusions or malicious activities in real-time.
publishDate 2023
dc.date.none.fl_str_mv 2023-11-23
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/840
10.47796/ing.v5i0.840
url https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/840
identifier_str_mv 10.47796/ing.v5i0.840
dc.language.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/840/830
https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/840/858
dc.rights.none.fl_str_mv http://creativecommons.org/licenses/by/4.0
info:eu-repo/semantics/openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by/4.0
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
text/html
dc.publisher.none.fl_str_mv UNIVERSIDAD PRIVADA DE TACNA
publisher.none.fl_str_mv UNIVERSIDAD PRIVADA DE TACNA
dc.source.none.fl_str_mv INGENIERÍA INVESTIGA; Vol. 5 (2023): Ingeniería Investiga
INGENIERÍA INVESTIGA; Vol. 5 (2023): Ingeniería Investiga
2708-3039
10.47796/ing.v5i0
reponame:Revistas - Universidad Privada de Tacna
instname:Universidad Privada de Tacna
instacron:UPT
instname_str Universidad Privada de Tacna
instacron_str UPT
institution UPT
reponame_str Revistas - Universidad Privada de Tacna
collection Revistas - Universidad Privada de Tacna
repository.name.fl_str_mv
repository.mail.fl_str_mv
_version_ 1842353930022944768
score 12.659675
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).