Abstract
Network security is essential in all aspects of the network. The infrastructure has now been put in place throughout workplaces, educational institutions, finance companies, and everywhere. But, nearly all people in social networking media participate. While many kinds of networks security measures are being used, most of the other operations seem to be susceptible. This report provides an analysis of various kinds of network attacks and numerous IDSs, in particular. This could also present an opportunity to build new IDS to prevent various cyber threats from the network system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Steingartner W, Galinec D, Kozina A (2021) Threat defense: cyber deception approach and education for resilience in hybrid threats model. Symmetry 13(4):597
Oakley J (2018) Improving offensive cyber security assessments using varied and novel initialization perspectives. In: Proceedings of the ACMSE 2018 conference, pp 1–9
Adomnicai A, Fournier JJ, Masson L (2018) Hardware security threats against Bluetooth mesh networks. In: IEEE conference on communications and network security (CNS). IEEE, pp 1–9
Montasari R, Hill R, Parkinson S, Daneshkhah A, Hosseinian-Far A (2020) Hardware-based cyber threats: attack vectors and defence techniques. Int J Electron Secur Digit Forensics 12(4):397–411
Saha S, Das A, Kumar A, Biswas D, Saha S (2019) Ethical hacking: redefining security in information system. In: International ethical hacking conference. Springer, Singapore, pp 203–218
Samtani S, Chinn R, Chen H, Nunamaker JF Jr (2017) Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. J Manag Inf Syst 34(4):1023–1053
Tuma K, Calikli G, Scandariato R (2018) Threat analysis of software systems: a systematic literature review. J Syst Softw 144:275–294
Kim J, Kim HS (2020) Intrusion detection based on spatiotemporal characterization of cyberattacks. Electronics 9(3):460
Hayashi M, Owari M, Kato G, Cai N (2017) Secrecy and robustness for active attack in secure network coding. In: IEEE international symposium on information theory (ISIT). IEEE, pp 1172–1176
Aminuddin MAIM, Zaaba ZF, Samsudin A, Juma'at NBA, Sukardi S (2020) Analysis of the paradigm on tor attack studies. In: 8th International conference on information technology and multimedia (ICIMU). IEEE, pp 126–131
Jyothirmai P, Raj JS, Smys S (2017) Secured self organizing network architecture in wireless personal networks. Wireless Pers Commun 96(4):5603–5620
Singh K, Singh P, Kumar K (2017) Application layer HTTP-GET flood DDoS attacks: research landscape and challenges. Comput Secur 65:344–372
Sinha P, Kumar Rai A, Bhushan B (2019) Information security threats and attacks with conceivable counteraction. In: 2nd International conference on intelligent computing, instrumentation and control technologies (ICICICT), vol 1. IEEE, pp 1208–1213
Nadar VM, Chatterjee M, Jacob L (2018) A defensive approach for CSRF and broken authentication and session management attack. In: Ambient communications and computer systems. Springer, Singapore, pp 577–588
Sarmah U, Bhattacharyya DK, Kalita JK (2018) A survey of detection methods for XSS attacks. J Netw Comput Appl 118:113–143
Srinivasan SM, Sangwan RS (2017) Web app security: a comparison and categorization of testing frameworks. IEEE Softw 34(1):99–102
Cheng L, Liu F, Yao D (2017) Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdiscip Rev Data Min Knowl Disc 7(5):e1211
Bhanipati J, Singh D, Biswal AK, Rout SK (2021) Minimization of collision through retransmission and optimal power allocation in wireless sensor networks (WSNs). In: Advances in intelligent computing and communication. Springer, Singapore, pp 653–665
Tourani R, Misra S, Mick T, Panwar G (2017) Security, privacy, and access control in information-centric networking: a survey. IEEE Commun Surv Tutorials 20(1):566–600
Biswal AK, Singh D, Pattanayak BK, Samanta D, Chaudhry SA, Irshad A (2021) Adaptive fault-tolerant system and optimal power allocation for smart vehicles in smart cities using controller area network. Secur Commun Networks 2021:13, Article ID 2147958. https://doi.org/10.1155/2021/214795
Rankothge WH, Randeniya SM (2020) Identification and mitigation tool for cross-site request forgery (CSRF). In: IEEE 8th R10 humanitarian technology conference (R10-HTC). IEEE, pp 1–5
Cheminod M, Durante L, Seno L, Valenzano A (2017) Detection of attacks based on known vulnerabilities in industrial networked systems. J Inf Secur Appl 34:153–165
Touseef P, Alam KA, Jamil A, Tauseef H, Ajmal S, Asif R, ... Mustafa S (2019) Analysis of automated web application security vulnerabilities testing. In: Proceedings of the 3rd international conference on future networks and distributed systems, pp 1–8
Franz A, Benlian A (2020) Spear phishing 2.0: how automated attacks present organizations with new challenges. HMD Praxis Wirtschaftsinformatik 57:597–612
Apostolaki M, Zohar A, Vanbever L (2017) Hijacking bitcoin: routing attacks on cryptocurrencies. In: IEEE symposium on security and privacy (SP). IEEE, pp 375–392
Biswal AK, Singh D, Pattanayak BK (2021) IoT-based voice-controlled energy-efficient intelligent traffic and street light monitoring system. In: Green technology for smart city and society. Springer, Singapore, pp 43–54
Pradhan M, Nayak CK, Pradhan SK (2020) Intrusion detection system (IDS) and their types. In: Securing the Internet of Things: concepts, methodologies, tools, and applications. IGI Global, pp 481–497
Ken FY, Harang RE, Wood KN (2017) Machine learning for intrusion detection in mobile tactical networks. In: Cyber sensing, vol 10185. International Society for Optics and Photonics, p 1018504
Jose S, Malathi D, Reddy B, Jayaseeli D (2018) A survey on anomaly based host intrusion detection system. J Phys Conf Ser 1000(1):012049
Chawla A, Lee B, Fallon S, Jacob P (2018) Host based intrusion detection system with combined CNN/RNN model. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, Cham, pp 149–158
Zavrak S, İskefiyeli M (2020) Anomaly-based intrusion detection from network flow features using variationalautoencoder. IEEE Access 8:108346–108358
Biswal AK, Singh D, Pattanayak BK, Samanta D, Yang MH (2021) IoT-based smart alert system for drowsy driver detection. Wireless Commun Mob Comput
Barghi MN, Hosseinkhani J, Keikhaee S (2015) An effective web mining-based approach to improve the detection of alerts in intrusion detection systems. Int J Adv Comput Sci Inf Technol (IJACSIT), (ELVEDIT) 4(1):38–45
Koo TM, Chang HC, Hsu YT, Lin HY (2013) Malicious website detection based on honeypot systems. In: 2nd International conference on advances in computer science and engineering (CSE 2013). Atlantis Press, pp 76–82
Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: from network event correlation to incident detection. Comput Secur 48:35–57
Salama SE, Marie MI, El-Fangary LM, Helmy YK (2012) Web anomaly misuse intrusion detection framework for SQL injection detection. Editorial Preface 3(3)
Chen CM, Lin HC (2015) Detecting botnet by anomalous traffic. J Inf Secur Appl 21:42–51
Kar D, Panigrahi S, Sundararajan S (2015) SQLiDDS: SQL injection detection using query transformation and document similarity. In: International conference on distributed computing and internet technology. Springer, Cham, pp 377–390
Somwanshi AA, Joshi SA (2016) Implementation of honeypots for server security. Int Res J Eng Technol (IRJET) 3(03):285–288
Kaur J, Singh R, Kaur P (2015) Prevention of DDoS and brute force attacks on web log files using combination of genetic algorithm and feed forward back propagation neural network. Int J Comput Appl 120(23)
Kour H, Sharma LS (2016) Tracing out cross site scripting vulnerabilities in modern scripts. Int J Adv Networking Appl 7(5):2862
Seeber S, Rodosek GD (2015) Towards an adaptive and effective IDS using OpenFlow. In: IFIP international conference on autonomous infrastructure, management and security. Springer, Cham, pp 134–139
Saito S, Maruhashi K, Takenaka M, Torii S (2016) Topase: detection and prevention of brute force attacks with disciplined IPs from IDs logs. J Inf Process 24(2):217–226
Ali Zardari Z, He J, Zhu N, Mohammadani KH, Pathan MS, Hussain MI, Memon MQ (2019) A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 11(3):61
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Samantaray, M., Satapathy, S., Lenka, A. (2022). A Systematic Study on Network Attacks and Intrusion Detection System. In: Skala, V., Singh, T.P., Choudhury, T., Tomar, R., Abul Bashar, M. (eds) Machine Intelligence and Data Science Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 132. Springer, Singapore. https://doi.org/10.1007/978-981-19-2347-0_16
Download citation
DOI: https://doi.org/10.1007/978-981-19-2347-0_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2346-3
Online ISBN: 978-981-19-2347-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)