Publication: A Systematic Literature Review on Host-Based Intrusion Detection Systems
| dc.authorscopusid | 57212210447 | |
| dc.authorscopusid | 15833929800 | |
| dc.authorscopusid | 56247050200 | |
| dc.contributor.author | Satılmış, H. | |
| dc.contributor.author | Akleylek, S. | |
| dc.contributor.author | Tok, Z.Y. | |
| dc.date.accessioned | 2025-12-11T00:33:06Z | |
| dc.date.issued | 2024 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Satılmış] Hami, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Akleylek] Sedat, Department of Computer Engineering, İstinye Üniversitesi, Istanbul, Turkey, Chair of Security and Theoretical Computer Science, Tartu Ülikool, Tartu, Tartumaa, Estonia; [Tok] Zaliha Yüce, ASELSAN A.Ş., Yenimahalle, Ankara, Turkey | en_US |
| dc.description.abstract | With the advancements in computer networks and systems, the number of security vulnerabilities and cyber attacks targeting/using these vulnerabilities continues to increase. Consequently, various intrusion detection systems (IDS) have been developed to detect cyber attacks and ensure information security. IDSs are categorized into two classes based on the data sources: Network-based intrusion detection system (NIDS) and host-based intrusion detection system (HIDS). In this systematic literature review (SLR), studies are examined that focus on HIDS or propose methods applicable to HIDS, as well as those related to IDSs that can be converted into HIDSs. The studies published between 2020 and 2023 are collected from widely used academic databases through various query statements. Filtering based on specific selection and elimination criteria is undergone by the collected studies, resulting in 21 studies for examination. Subsequently, these studies and their advantages and disadvantages are discussed. In addition, while examining the studies, five research questions are addressed. Finally, the defects, potential areas for improvement, and future research directions related to HIDSs are discussed. © 2013 IEEE. | en_US |
| dc.identifier.doi | 10.1109/ACCESS.2024.3367004 | |
| dc.identifier.endpage | 27266 | en_US |
| dc.identifier.issn | 2169-3536 | |
| dc.identifier.scopus | 2-s2.0-85186066795 | |
| dc.identifier.scopusquality | Q1 | |
| dc.identifier.startpage | 27237 | en_US |
| dc.identifier.uri | https://doi.org/10.1109/ACCESS.2024.3367004 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12712/37330 | |
| dc.identifier.volume | 12 | en_US |
| dc.identifier.wosquality | Q2 | |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
| dc.relation.ispartof | IEEE Access | en_US |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.subject | Deep Learning | en_US |
| dc.subject | Host-Based Intrusion Detection System | en_US |
| dc.subject | Information Security | en_US |
| dc.subject | Intrusion Detection System | en_US |
| dc.subject | Machine Learning | en_US |
| dc.title | A Systematic Literature Review on Host-Based Intrusion Detection Systems | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication |
