A Systematic Literature Review on Host-Based Intrusion Detection Systems

dc.authoridAkleylek, Sedat/0000-0001-7005-6489
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.contributor.authorSatilmis, Hami
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorTok, Zaliha Yuce
dc.date.accessioned2024-05-19T14:50:19Z
dc.date.available2024-05-19T14:50:19Z
dc.date.issued2024
dc.departmentİstinye Üniversitesien_US
dc.description.abstractWith the advancements in computer networks and systems, the number of security vulnerabilities and cyber attacks targeting/using these vulnerabilities continues to increase. Consequently, various intrusion detection systems (IDS) have been developed to detect cyber attacks and ensure information security. IDSs are categorized into two classes based on the data sources: Network-based intrusion detection system (NIDS) and host-based intrusion detection system (HIDS). In this systematic literature review (SLR), studies are examined that focus on HIDS or propose methods applicable to HIDS, as well as those related to IDSs that can be converted into HIDSs. The studies published between 2020 and 2023 are collected from widely used academic databases through various query statements. Filtering based on specific selection and elimination criteria is undergone by the collected studies, resulting in 21 studies for examination. Subsequently, these studies and their advantages and disadvantages are discussed. In addition, while examining the studies, five research questions are addressed. Finally, the defects, potential areas for improvement, and future research directions related to HIDSs are discussed.en_US
dc.description.sponsorshipScientific and Technological Research Council of Turkey (TUBITAK) Frontier R&D Laboratories Support Program 1515en_US
dc.description.sponsorshipNo Statement Availableen_US
dc.identifier.doi10.1109/ACCESS.2024.3367004
dc.identifier.endpage27266en_US
dc.identifier.issn2169-3536
dc.identifier.scopus2-s2.0-85186066795en_US
dc.identifier.scopusqualityQ1en_US
dc.identifier.startpage27237en_US
dc.identifier.urihttps://doi.org10.1109/ACCESS.2024.3367004
dc.identifier.urihttps://hdl.handle.net/20.500.12713/5664
dc.identifier.volume12en_US
dc.identifier.wosWOS:001173144000001en_US
dc.identifier.wosqualityN/Aen_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherIeee-Inst Electrical Electronics Engineers Incen_US
dc.relation.ispartofIeee Accessen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.snmz20240519_kaen_US
dc.subjectUndernutritionen_US
dc.subjectFactorsen_US
dc.subjectAlgeriaen_US
dc.subjectEgypten_US
dc.subjectSudanen_US
dc.subjectTunisiaen_US
dc.titleA Systematic Literature Review on Host-Based Intrusion Detection Systemsen_US
dc.typeReview Articleen_US

Dosyalar