Skip to main content

A Systematic Study on Network Attacks and Intrusion Detection System

  • Conference paper
  • First Online:
Machine Intelligence and Data Science Applications

Abstract

Network security is essential in all aspects of the network. The infrastructure has now been put in place throughout workplaces, educational institutions, finance companies, and everywhere. But, nearly all people in social networking media participate. While many kinds of networks security measures are being used, most of the other operations seem to be susceptible. This report provides an analysis of various kinds of network attacks and numerous IDSs, in particular. This could also present an opportunity to build new IDS to prevent various cyber threats from the network system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Steingartner W, Galinec D, Kozina A (2021) Threat defense: cyber deception approach and education for resilience in hybrid threats model. Symmetry 13(4):597

    Article  Google Scholar 

  2. Oakley J (2018) Improving offensive cyber security assessments using varied and novel initialization perspectives. In: Proceedings of the ACMSE 2018 conference, pp 1–9

    Google Scholar 

  3. Adomnicai A, Fournier JJ, Masson L (2018) Hardware security threats against Bluetooth mesh networks. In: IEEE conference on communications and network security (CNS). IEEE, pp 1–9

    Google Scholar 

  4. Montasari R, Hill R, Parkinson S, Daneshkhah A, Hosseinian-Far A (2020) Hardware-based cyber threats: attack vectors and defence techniques. Int J Electron Secur Digit Forensics 12(4):397–411

    Article  Google Scholar 

  5. Saha S, Das A, Kumar A, Biswas D, Saha S (2019) Ethical hacking: redefining security in information system. In: International ethical hacking conference. Springer, Singapore, pp 203–218

    Google Scholar 

  6. Samtani S, Chinn R, Chen H, Nunamaker JF Jr (2017) Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. J Manag Inf Syst 34(4):1023–1053

    Article  Google Scholar 

  7. Tuma K, Calikli G, Scandariato R (2018) Threat analysis of software systems: a systematic literature review. J Syst Softw 144:275–294

    Article  Google Scholar 

  8. Kim J, Kim HS (2020) Intrusion detection based on spatiotemporal characterization of cyberattacks. Electronics 9(3):460

    Article  Google Scholar 

  9. Hayashi M, Owari M, Kato G, Cai N (2017) Secrecy and robustness for active attack in secure network coding. In: IEEE international symposium on information theory (ISIT). IEEE, pp 1172–1176

    Google Scholar 

  10. Aminuddin MAIM, Zaaba ZF, Samsudin A, Juma'at NBA, Sukardi S (2020) Analysis of the paradigm on tor attack studies. In: 8th International conference on information technology and multimedia (ICIMU). IEEE, pp 126–131

    Google Scholar 

  11. Jyothirmai P, Raj JS, Smys S (2017) Secured self organizing network architecture in wireless personal networks. Wireless Pers Commun 96(4):5603–5620

    Article  Google Scholar 

  12. Singh K, Singh P, Kumar K (2017) Application layer HTTP-GET flood DDoS attacks: research landscape and challenges. Comput Secur 65:344–372

    Article  Google Scholar 

  13. Sinha P, Kumar Rai A, Bhushan B (2019) Information security threats and attacks with conceivable counteraction. In: 2nd International conference on intelligent computing, instrumentation and control technologies (ICICICT), vol 1. IEEE, pp 1208–1213

    Google Scholar 

  14. Nadar VM, Chatterjee M, Jacob L (2018) A defensive approach for CSRF and broken authentication and session management attack. In: Ambient communications and computer systems. Springer, Singapore, pp 577–588

    Google Scholar 

  15. Sarmah U, Bhattacharyya DK, Kalita JK (2018) A survey of detection methods for XSS attacks. J Netw Comput Appl 118:113–143

    Article  Google Scholar 

  16. Srinivasan SM, Sangwan RS (2017) Web app security: a comparison and categorization of testing frameworks. IEEE Softw 34(1):99–102

    Article  Google Scholar 

  17. Cheng L, Liu F, Yao D (2017) Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdiscip Rev Data Min Knowl Disc 7(5):e1211

    Article  Google Scholar 

  18. Bhanipati J, Singh D, Biswal AK, Rout SK (2021) Minimization of collision through retransmission and optimal power allocation in wireless sensor networks (WSNs). In: Advances in intelligent computing and communication. Springer, Singapore, pp 653–665

    Google Scholar 

  19. Tourani R, Misra S, Mick T, Panwar G (2017) Security, privacy, and access control in information-centric networking: a survey. IEEE Commun Surv Tutorials 20(1):566–600

    Article  Google Scholar 

  20. Biswal AK, Singh D, Pattanayak BK, Samanta D, Chaudhry SA, Irshad A (2021) Adaptive fault-tolerant system and optimal power allocation for smart vehicles in smart cities using controller area network. Secur Commun Networks 2021:13, Article ID 2147958. https://doi.org/10.1155/2021/214795

  21. Rankothge WH, Randeniya SM (2020) Identification and mitigation tool for cross-site request forgery (CSRF). In: IEEE 8th R10 humanitarian technology conference (R10-HTC). IEEE, pp 1–5

    Google Scholar 

  22. Cheminod M, Durante L, Seno L, Valenzano A (2017) Detection of attacks based on known vulnerabilities in industrial networked systems. J Inf Secur Appl 34:153–165

    Google Scholar 

  23. Touseef P, Alam KA, Jamil A, Tauseef H, Ajmal S, Asif R, ... Mustafa S (2019) Analysis of automated web application security vulnerabilities testing. In: Proceedings of the 3rd international conference on future networks and distributed systems, pp 1–8

    Google Scholar 

  24. Franz A, Benlian A (2020) Spear phishing 2.0: how automated attacks present organizations with new challenges. HMD Praxis Wirtschaftsinformatik 57:597–612

    Article  Google Scholar 

  25. Apostolaki M, Zohar A, Vanbever L (2017) Hijacking bitcoin: routing attacks on cryptocurrencies. In: IEEE symposium on security and privacy (SP). IEEE, pp 375–392

    Google Scholar 

  26. Biswal AK, Singh D, Pattanayak BK (2021) IoT-based voice-controlled energy-efficient intelligent traffic and street light monitoring system. In: Green technology for smart city and society. Springer, Singapore, pp 43–54

    Google Scholar 

  27. Pradhan M, Nayak CK, Pradhan SK (2020) Intrusion detection system (IDS) and their types. In: Securing the Internet of Things: concepts, methodologies, tools, and applications. IGI Global, pp 481–497

    Google Scholar 

  28. Ken FY, Harang RE, Wood KN (2017) Machine learning for intrusion detection in mobile tactical networks. In: Cyber sensing, vol 10185. International Society for Optics and Photonics, p 1018504

    Google Scholar 

  29. Jose S, Malathi D, Reddy B, Jayaseeli D (2018) A survey on anomaly based host intrusion detection system. J Phys Conf Ser 1000(1):012049

    Google Scholar 

  30. Chawla A, Lee B, Fallon S, Jacob P (2018) Host based intrusion detection system with combined CNN/RNN model. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, Cham, pp 149–158

    Google Scholar 

  31. Zavrak S, İskefiyeli M (2020) Anomaly-based intrusion detection from network flow features using variationalautoencoder. IEEE Access 8:108346–108358

    Article  Google Scholar 

  32. Biswal AK, Singh D, Pattanayak BK, Samanta D, Yang MH (2021) IoT-based smart alert system for drowsy driver detection. Wireless Commun Mob Comput

    Google Scholar 

  33. Barghi MN, Hosseinkhani J, Keikhaee S (2015) An effective web mining-based approach to improve the detection of alerts in intrusion detection systems. Int J Adv Comput Sci Inf Technol (IJACSIT), (ELVEDIT) 4(1):38–45

    Google Scholar 

  34. Koo TM, Chang HC, Hsu YT, Lin HY (2013) Malicious website detection based on honeypot systems. In: 2nd International conference on advances in computer science and engineering (CSE 2013). Atlantis Press, pp 76–82

    Google Scholar 

  35. Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: from network event correlation to incident detection. Comput Secur 48:35–57

    Article  Google Scholar 

  36. Salama SE, Marie MI, El-Fangary LM, Helmy YK (2012) Web anomaly misuse intrusion detection framework for SQL injection detection. Editorial Preface 3(3)

    Google Scholar 

  37. Chen CM, Lin HC (2015) Detecting botnet by anomalous traffic. J Inf Secur Appl 21:42–51

    Google Scholar 

  38. Kar D, Panigrahi S, Sundararajan S (2015) SQLiDDS: SQL injection detection using query transformation and document similarity. In: International conference on distributed computing and internet technology. Springer, Cham, pp 377–390

    Google Scholar 

  39. Somwanshi AA, Joshi SA (2016) Implementation of honeypots for server security. Int Res J Eng Technol (IRJET) 3(03):285–288

    Google Scholar 

  40. Kaur J, Singh R, Kaur P (2015) Prevention of DDoS and brute force attacks on web log files using combination of genetic algorithm and feed forward back propagation neural network. Int J Comput Appl 120(23)

    Google Scholar 

  41. Kour H, Sharma LS (2016) Tracing out cross site scripting vulnerabilities in modern scripts. Int J Adv Networking Appl 7(5):2862

    Google Scholar 

  42. Seeber S, Rodosek GD (2015) Towards an adaptive and effective IDS using OpenFlow. In: IFIP international conference on autonomous infrastructure, management and security. Springer, Cham, pp 134–139

    Google Scholar 

  43. Saito S, Maruhashi K, Takenaka M, Torii S (2016) Topase: detection and prevention of brute force attacks with disciplined IPs from IDs logs. J Inf Process 24(2):217–226

    Google Scholar 

  44. Ali Zardari Z, He J, Zhu N, Mohammadani KH, Pathan MS, Hussain MI, Memon MQ (2019) A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 11(3):61

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Milan Samantaray .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Samantaray, M., Satapathy, S., Lenka, A. (2022). A Systematic Study on Network Attacks and Intrusion Detection System. In: Skala, V., Singh, T.P., Choudhury, T., Tomar, R., Abul Bashar, M. (eds) Machine Intelligence and Data Science Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 132. Springer, Singapore. https://doi.org/10.1007/978-981-19-2347-0_16

Download citation

Publish with us

Policies and ethics