Comprehensive Analysis of Intrusion Detection Systems and their Associated Algorithms in Information Security

Descripción del Articulo

The study primarily focuses on the analysis and comparison of intrusion detection techniques in network environments, with the objective of evaluating the impact of Intrusion Detection Systems (IDSs) on data protection. It also aims to understand how these techniques have adapted to emerging threats...

Descripción completa

Detalles Bibliográficos
Autores: Enciso Suárez, Joel Renato, Portilla Rodriguez, Jack Edinson, Mendoza de los Santos , Alberto Carlos
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Privada de Tacna
Repositorio:Revistas - Universidad Privada de Tacna
Lenguaje:español
OAI Identifier:oai:revistas.upt.edu.pe:article/840
Enlace del recurso:https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/840
Nivel de acceso:acceso abierto
Materia:Seguridad de información
protección digital
IDS
algoritmos
amenazas cibernéticas
Information security
digital protection
algorithms
cyber threats
Descripción
Sumario:The study primarily focuses on the analysis and comparison of intrusion detection techniques in network environments, with the objective of evaluating the impact of Intrusion Detection Systems (IDSs) on data protection. It also aims to understand how these techniques have adapted to emerging threats and evaluate their effectiveness in detecting malicious activities. To achieve this, a systematic review of documents stored in the IEEE Xplore, Redalyc, and ScienceDirect databases between 2019 and 2023 was conducted. The analysis reveals that intrusion detection techniques have evolved significantly to address constantly changing cyber threats. Specifically, machine learning-based techniques and behavior analysis have proven to be effective in reducing false positives. However, to keep up to date with the threats, constant management and updating of these techniques is required. Furthermore, it has been determined that intrusion detection is crucial for cybersecurity. This is because in a rapidly evolving cyber environment where threats swiftly advance, IDSs provide critical defense by offering continuous visibility and protection against potential intrusions or malicious activities in real-time.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).