Hybrid IDS Using Signature-Based and Anomaly-Based Detection
- URL: http://arxiv.org/abs/2601.11998v1
- Date: Sat, 17 Jan 2026 10:19:57 GMT
- Title: Hybrid IDS Using Signature-Based and Anomaly-Based Detection
- Authors: Messaouda Boutassetta, Amina Makhlouf, Newfel Messaoudi, Abdelmadjid Benmachiche, Ines Boutabia,
- Abstract summary: Intrusion detection systems (IDS) are essential for protecting computer systems and networks against a wide range of cyber threats.<n>IDS are commonly categorized into two main types, each with its own strengths and limitations.<n>This paper presents a conceptual overview of Hybrid IDS, which integrate signature-based and anomaly-based detection techniques.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Intrusion detection systems (IDS) are essential for protecting computer systems and networks against a wide range of cyber threats that continue to evolve over time. IDS are commonly categorized into two main types, each with its own strengths and limitations, such as difficulty in detecting previously unseen attacks and the tendency to generate high false positive rates. This paper presents a comprehensive survey and a conceptual overview of Hybrid IDS, which integrate signature-based and anomaly-based detection techniques to enhance attack detection capabilities. The survey examines recent research on Hybrid IDS, classifies existing models into functional categories, and discusses their advantages, limitations, and application domains, including financial systems, air traffic control, and social networks. In addition, recent trends in Hybrid IDS research, such as machine learning-based approaches and cloud-based deployments, are reviewed. Finally, this work outlines potential future research directions aimed at developing more cost-effective Hybrid IDS solutions with improved ability to detect emerging and sophisticated cyberattacks.
Related papers
- Multi-Agent Collaborative Intrusion Detection for Low-Altitude Economy IoT: An LLM-Enhanced Agentic AI Framework [60.72591149679355]
The rapid expansion of low-altitude economy Internet of Things (LAE-IoT) networks has created unprecedented security challenges.<n>Traditional intrusion detection systems fail to tackle the unique characteristics of aerial IoT environments.<n>We introduce a large language model (LLM)-enabled agentic AI framework for enhancing intrusion detection in LAE-IoT networks.
arXiv Detail & Related papers (2026-01-25T12:47:25Z) - Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation [47.76793060077816]
Intrusion Detection Systems (IDS) play a crucial role in network security defense.<n>A significant challenge for IDS in training detection models is the shortage of adequately labeled malicious samples.<n>This paper introduces a novel semi-supervised framework textbfGANGRL-LLM, which integrates Generative Adrial Networks (GANs) with Large Language Models (LLMs)
arXiv Detail & Related papers (2025-08-25T15:55:17Z) - Anomaly Detection and Generation with Diffusion Models: A Survey [51.61574868316922]
Anomaly detection (AD) plays a pivotal role across diverse domains, including cybersecurity, finance, healthcare, and industrial manufacturing.<n>Recent advancements in deep learning, specifically diffusion models (DMs), have sparked significant interest.<n>This survey aims to guide researchers and practitioners in leveraging DMs for innovative AD solutions across diverse applications.
arXiv Detail & Related papers (2025-06-11T03:29:18Z) - A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges [0.40964539027092917]
IDS aims to protect computer networks from security threats by detecting, notifying, and taking appropriate action to prevent illegal access and protect confidential information.<n>Researchers are enhancing the effectiveness of IDS by incorporating popular datasets into machine learning algorithms.<n>This paper explores the methods of capturing and reviewing intrusion detection systems (IDS) and evaluates the challenges existing datasets face.
arXiv Detail & Related papers (2025-06-03T04:47:21Z) - Modern DDoS Threats and Countermeasures: Insights into Emerging Attacks and Detection Strategies [49.57278643040602]
Distributed Denial of Service (DDoS) attacks persist as significant threats to online services and infrastructure.<n>This paper offers a comprehensive survey of emerging DDoS attacks and detection strategies over the past decade.
arXiv Detail & Related papers (2025-02-27T11:22:25Z) - Hybrid Machine Learning Models for Intrusion Detection in IoT: Leveraging a Real-World IoT Dataset [0.0]
Intrusion Detection Systems (IDS) are crucial for mitigating these threats.<n>Recent advancements in Machine Learning (ML) offer promising avenues for improvement.<n>This research explores a hybrid approach, combining several standalone ML models.
arXiv Detail & Related papers (2025-02-17T23:41:10Z) - An Anomaly Detection System Based on Generative Classifiers for Controller Area Network [7.537220883022467]
Modern vehicles are susceptible to various types of attacks, enabling attackers to gain control and compromise safety-critical systems.<n>Several Intrusion Detection Systems (IDSs) have been proposed in the literature to detect such cyber-attacks on vehicles.<n>This paper introduces a novel generative classifier-based IDS for anomaly detection in automotive networks.
arXiv Detail & Related papers (2024-12-28T19:59:33Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
Contemporary Survey [114.17568992164303]
Adrial attacks and defenses in machine learning and deep neural network have been gaining significant attention.
This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques.
New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks.
arXiv Detail & Related papers (2023-03-11T04:19:31Z) - False Data Injection Threats in Active Distribution Systems: A
Comprehensive Survey [1.9084046244608193]
The integration of several cutting-edge technologies has introduced several security and privacy vulnerabilities.
Recent research trends have shown that False Data Injection (FDI) attacks are becoming one of the most malicious cyber threats within the entire smart grid paradigm.
arXiv Detail & Related papers (2021-11-28T22:25:15Z) - G-IDS: Generative Adversarial Networks Assisted Intrusion Detection
System [1.5119440099674917]
We propose a generative adversarial network (GAN) based intrusion detection system (G-IDS)
G-IDS generates synthetic samples, and IDS gets trained on them along with the original ones.
We find that our proposed G-IDS model performs much better in attack detection and model stabilization during the training process than a standalone IDS.
arXiv Detail & Related papers (2020-06-01T02:42:46Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.