Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Defending the Digital Frontier: IDPS and the Battle Against Cyber Threat

Version 1 : Received: 9 November 2023 / Approved: 9 November 2023 / Online: 9 November 2023 (10:59:26 CET)

A peer-reviewed article of this Preprint also exists.

Azam, H.; Dulloo, M.I.; Majeed, M.H.; Wan, J.P.H.; Xin, L.T.; Tajwar, M.A.; Sindiramutty, S.R. Defending the Digital Frontier: IDPS and the Battle Against Cyber Threat. International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence 2023, 2, doi:10.54938/ijemdcsai.2023.02.1.253. Azam, H.; Dulloo, M.I.; Majeed, M.H.; Wan, J.P.H.; Xin, L.T.; Tajwar, M.A.; Sindiramutty, S.R. Defending the Digital Frontier: IDPS and the Battle Against Cyber Threat. International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence 2023, 2, doi:10.54938/ijemdcsai.2023.02.1.253.

Abstract

The ever-evolving landscape of technology continually drives the demand for more robust and secure systems. Intrusion Detection and Prevention Systems (IPS) play a pivotal role in safeguarding digital infrastructures. IPS harnesses a blend of cutting-edge technologies, specifically Network-Based, Wireless-Based, and Host-Based Intrusion Detection Systems (IDS), to fortify network security. This multifaceted approach enhances the system's capacity to scrutinize incoming data and network traffic, effectively reducing the risk of intrusion. In the realm of malicious activity detection, IPS employs a diverse array of techniques and mechanisms. Our proposed IPS integrates both anomaly-based and signature-based analysis approaches. In signature-based analysis, intrusions are identified by matching data collected from various activities with pre-defined signatures, employing rule-based methods to detect anomalies effectively. In the anomaly-based analysis approach, the system juxtaposes current activities with a baseline of normal behaviour to flag any deviations. This is achieved through distance-based methods, ensuring a well-rounded approach to threat detection. Our comprehensive prevention system encompasses a suite of security measures, including anti-virus software, Deep Packet Inspection, and Quarantine. These components work in synergy to detect and thwart malicious activities effectively. Even when concealed or hidden, the IPS remains a reliable sentinel, ensuring the integrity of your digital ecosystem. This review delves into the intricate web of terminologies and concepts surrounding Intrusion Detection and Prevention Systems, shedding light on the evolving technology landscape and the critical role IPS plays in bolstering cybersecurity.

Keywords

Intrusion Prevention System (IPS); Intrusion Detection System (IDS); Intrusion Detection and Presentation System (IDPS); Deep Packet Inspection (DPI); Network-Based Prevention System (NIPS)

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.