A Mapping Study of Intrusion Detection System

Authors

  • Wan Ahmad Safwan Wan Umar Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia
  • Norsaremah Salleh Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia

DOI:

https://doi.org/10.31436/ijpcc.v10i2.466

Keywords:

Intrusion detection, Attack detection, Mapping study, Types of attack

Abstract

The Network Security Monitoring System has been widely used to check many systems that supply services. A lot of monitoring tools have been developed to facilitate the monitoring of the network security. Since there are a lot of options to cater to our needs, this will cause a lot of time and resources to try each tool that is suitable with the system. In this research, we conducted a comparative analysis to analyse each tool presenting their advantages, disadvantages and the method used. The main objective of this research is to perform a systematic mapping study for the purpose to identify research topics related to network intrusion detection system, to assess the most frequently applied method of intrusion detection system, and to verify the types of cyber-attack that currently exist. Based on the 30 primary studies included in this mapping study, the findings indicated that the most intrusion detection system commonly used is the hybrid method and Data Injection has been the primary attack type in the existing system.

References

Mihret, Estifanos Tilahun. n.d. # Intrusion Detection System-IDS-Journal-by Sci-Tech with Estif Intrusion Detection System-IDS.

An, Dou, Feiye Zhang, Qingyu Yang, and Chengwei Zhang. 2022. “Data Integrity Attack in Dynamic State Estimation of Smart Grid: Attack Model and Countermeasures.” IEEE Transactions on Automation Science and Engineering 19(3):1631–44. doi: 10.1109/TASE.2022.3149764.

Vuong, Tuan Phan, George Loukas, Diane Gan, and Anatolij Bezemskij. 2015. “Decision Tree-Based Detection of Denial of Service and Command Injection Attacks on Robotic Vehicles.” in 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc.

Wu, Shimeng, Yuchen Jiang, Hao Luo, and Xianling Li. 2021. “Deep Learning-Based Defense and Detection Scheme against Eavesdropping and Typical Cyber- Physical Attacks.” in 2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes, SAFEPROCESS 2021. Institute of Electrical and Electronics Engineers Inc.

Petersen, Kai, Hochschule Flensburg, Robert Feldt, Michael Mattsson, and Shahid Mujtaba. 2008. Systematic Mapping Studies in Software Engineering.

Scott, W., and Robert S. A. n.d. The Well-Built Clinical Question: A Key to Evidence- Based Decisions. Vol. 123.

P1 --- M. Ghaderi, K. Gheitasi and W. Lucia, "A Blended Active Detection Strategy for False Data Injection Attacks in Cyber-Physical Systems," in IEEE Transactions on Control of Network Systems, vol. 8, no. 1, pp. 168-176, March 2021

J. Wei, "A data-driven cyber-physical detection and defense strategy against data integrity attacks in smart grid systems,"2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Orlando, FL, USA, 2015, pp. 667-671.

J. Yang, L. Zhou, L. Wang, S. Li, Z. Lin and Z. Gu, "A Multi-step Attack Detection Framework for the Power System Network,"2022 7th IEEE International Conference on Data Science in Cyberspace (DSC), Guilin, China, 2022, pp. 1-8.

H. Sedjelmaci, S. M. Senouci and N. Ansari, "A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks," in IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 48, no. 9, pp. 1594-1606, Sept. 2018.

J. Gao, J. Li, H. Jiang, Y. Li and H. Quan, "A new Detection Approach against attack/intrusion in Measurement and Control System with Fins protocol," 2020 Chinese Automation Congress (CAC), Shanghai, China, 2020, pp. 3691-3696.

C. Zhang, D. Du, J. Zhang, M. Fei and A. Rakic, "A Novel Dynamic Watermarking-Based Attack Detection Method for Uncertain Networked Control Systems," 2021 IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE), Shanghai, China, 2021, pp. 1- 8.

Gorbenko, A., & Popov, V. (2020, May). Abnormal behavioral pattern detection in closed-loop robotic systems for zero-day deceptive threats. In 2020 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM) (pp. 1-6). IEEE.

K. Han, S. Li, Z. Wang and X. Yang, "Actuator deception attack detection and estimation for a class of nonlinear systems," 2018 37th Chinese Control Conference (CCC), Wuhan, China, 2018, pp. 5675-5680.?

A. W. Al-Dabbagh, Y. Li and T. Chen, "An Intrusion Detection System for Cyber Attacks in Wireless Networked Control Systems," inIEEE Transactions on Circuits and Systems II: Express Briefs, vol. 65, no. 8, pp. 1049-1053, Aug. 2018.

T. Badgujar and P. More, "An Intrusion Detection System implementing Host based attacks using Layered Framework," 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, 2015, pp. 1-4.

H. Guo, Z. -H. Pang, J. Sun and J. Li, "An Output-Coding-Based Detection Scheme Against Replay Attacks in Cyber-Physical Systems," in IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 68, no. 10, pp. 3306-3310, Oct. 2021.

B. Tulkun and B. Fayzullajon, "Analysis of Integrated Neural Network Attack Detection System and User Behavior Models," 2019 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2019, pp. 1-4.

H. Niu, C. Bhowmick and S. Jagannathan, "Attack Detection and Approximation in Nonlinear Networked Control Systems Using Neural Networks," in IEEE Transactions on Neural Networks and Learning Systems, vol. 31, no. 1, pp. 235-245, Jan. 2020.

A. Ameli, A. Hooshyar, E. F. El-Saadany and A. M. Youssef, "Attack Detection and Identification for Automatic Generation Control Systems," in IEEE Transactions on Power Systems, vol. 33, no. 5, pp. 4760-4774, Sept. 2018.?

Z. Tahir, A. Q. Khan and M. Asad, "Attack Detection and Identification in Cyber Physical Systems: An example on Three Tank System," 2019 15th International Conference on Emerging Technologies (ICET), Peshawar, Pakistan, 2019, pp. 1-6.

L. Kang and H. Shen, "Attack Detection and Mitigation for Sensor and CAN Bus Attacks in Vehicle Anti-lock Braking Systems,"2020 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 2020, pp. 1-9.

H. Li, X. He, Y. Zhang and W. Guan, "Attack Detection in Cyber- Physical Systems Using Particle Filter: An Illustration on Three-Tank System,"2018 IEEE 8th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), Tianjin, China, 2018, pp. 504-509.

P. Ramanan, D. Li and N. Gebraeel, "Blockchain-Based Decentralized Replay Attack Detection for Large-Scale Power Systems," inIEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 8, pp. 4727-4739, Aug. 2022.

S. Tan, J. M. Guerrero, P. Xie, R. Han and J. C. Vasquez, "Brief Survey on Attack Detection Methods for Cyber-Physical Systems," in IEEE Systems Journal, vol. 14, no. 4, pp. 5329-5339, Dec. 2020.?

R. Anguluri, V. Katewa and F. Pasqualetti, "Centralized Versus Decentralized Detection of Attacks in Stochastic Interconnected Systems,"in IEEE Transactions on Automatic Control, vol. 65, no. 9, pp. 3903-3910, Sept. 2020.?

M. Xiao, J. Wu, C. Long and S. Li, "Construction of false sequence attack against PLC based power control system," 2016 35th Chinese Control Conference (CCC), Chengdu, China, 2016, pp. 10090-10095.

K. Gupta, R. Ranjan Singh and M. Dixit, "Cross site scripting (XSS) attack detection using intrusion detection system,"2017 International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, 2017, pp. 199-203.

M. Dehghani, M. Ghiasi, T. Niknam, A. Kavousi-Fard, E. Tajik,S. Padmanaban, and H. Aliev , "Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack," in IEEE Access, vol. 9, pp. 16488-16507, 2021.?

A. Shi, "Cyber Attacks Detection Based on Generative Adversarial Networks," 2021 2nd Asia Conference on Computers and Communications (ACCC), Singapore, 2021, pp. 111-114.

D. An, F. Zhang, Q. Yang and C. Zhang, "Data Integrity Attack in Dynamic State Estimation of Smart Grid: Attack Model and Countermeasures," inIEEE Transactions on Automation Science and Engineering, vol. 19, no. 3, pp. 1631-1644, July 2022.

V. Krishnan and F. Pasqualetti, "Data-Driven Attack Detection for Linear Systems," in IEEE Control Systems Letters, vol. 5, no. 2, pp. 671-676, April 2021.

K. Xiahou, Y. Liu and Q. H. Wu, "Decentralized Detection and Mitigation of Multiple False Data Injection Attacks in Multiarea Power Systems," in IEEE Journal of Emerging and Selected Topics in Industrial Electronics, vol. 3, no. 1, pp. 101-112, Jan. 2022.

T. P. g, G. Loukas, D. Gan and A. Bezemskij, "Decision tree- based detection of denial of service and command injection attacks on robotic vehicles," 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, 2015, pp. 1-6.

S. Wu, Y. Jiang, H. Luo and X. Li, "Deep learning-based defense and detection scheme against eavesdropping and typical cyber-physical attacks," 2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes (SAFEPROCESS), Chengdu, China, 2021, pp. 1-6.

H. Yang, L. Cheng and M. C. Chuah, "Deep-Learning-Based Network Intrusion Detection for SCADA Systems,"2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 2019, pp. 1-7.

Downloads

Published

30-07-2024

How to Cite

Wan Umar, W. A. S., & Salleh, N. (2024). A Mapping Study of Intrusion Detection System. International Journal on Perceptive and Cognitive Computing, 10(2), 60–66. https://doi.org/10.31436/ijpcc.v10i2.466

Issue

Section

Articles

Most read articles by the same author(s)