Modern Network Security Threats and Defense Mechanisms: A Comparative Study of Intrusion Detection and Prevention Systems

α
Dr. Osama Marie
Dr. Osama Marie
α Al-Quds Open University

Send Message

To: Author

Modern Network Security Threats and Defense Mechanisms: A Comparative Study of Intrusion Detection and Prevention Systems

Article Fingerprint

ReserarchID

CSTNWS2E6D4

Modern Network Security Threats and Defense Mechanisms: A Comparative Study of Intrusion Detection and Prevention Systems Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Generating HTML Viewer...

References

40 Cites in Article
  1. S Axelsson (2000). Intrusion detection systems: A survey and taxonomy.
  2. T El-Darymli,P Sant,D Serpanos (2016). A survey of intrusion detection systems in cloud computing.
  3. R Roesch (1999). Snort-lightweight intrusion detection for networks.
  4. J Kindervag (2010). Build security into your network's DNA: The Zero Trust Network Architecture.
  5. Robin Sommer,Vern Paxson (2010). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.
  6. S Al-Qahtani,A Mahmood,T Alghamdi (2021). A survey on cyber security threats and detection techniques in network intrusion detection system.
  7. R Roesch (1999). Snort-lightweight intrusion detection for networks.
  8. L Buczak,E Guven (2016). A survey of data mining and machine learning methods for cyber security intrusion detection.
  9. J Kindervag (2010). No more chewy centers: Introducing the Zero Trust Model of information security.
  10. P Kumar,S Agarwal (2017). Network security threats and solutions for organizations.
  11. W Stallings (2017). Network Security Essentials: Applications and Standards.
  12. D Shackleford (2018). White paper urges risk assessment before connection.
  13. J Kindervag (2010). No more chewy centers: Introducing the Zero Trust Model of information security.
  14. L Buczak,E Guven (2016). A survey of data mining and machine learning methods for cyber security intrusion detection.
  15. M Sqalli,M Alenezi (2021). Cloud security: A comprehensive guide to secure cloud computing.
  16. D Douligeris,Serpanos (2004). Network security: Current status and future directions.
  17. Y Liu,Y Xia,M Zhang (2021). A survey on man-inthe-middle attacks.
  18. B Jain,Gupta (2019). A survey of phishing attack techniques, defenses and their implications.
  19. D Greitzer,Frincke (2010). Combining traditional cyber security audit data with psychosocial data: Towards predictive modeling for insider threat mitigation.
  20. J Chen,S Park,J Kim (2018). IoT security issues and challenges.
  21. B Sahu,S Mohapatra (2021). Advanced persistent threat detection and mitigation techniques: A review.
  22. Kharraz (2015). Cutting the Gordian knot: A look under the hood of ransomware attacks.
  23. Animesh Patcha,Jung-Min Park (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends.
  24. R Bace,P Mell (2001). Intrusion Detection Systems.
  25. S Kumar,E Spafford (1994). A pattern matching model for misuse intrusion detection.
  26. Anna Buczak,Erhan Guven (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.
  27. A Sharafaldin,A Lashkari,Ghorbani (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization.
  28. M Roesch (1999). Introducing Snort 2.6.
  29. Adel Alshamrani,Sowmya Myneni,Ankur Chowdhary,Dijiang Huang (2019). A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities.
  30. L Chen,S Sharma,K Ramakrishnan (2019). Realtime detection of DDoS attacks using adaptive filters.
  31. Ossec (2008). The OSSEC VMware Guest Image.
  32. H Lashkari,M Saad,A Ghorbani (2020). Towards a robust ransomware detection system based on machine learning.
  33. T Dreibholz,S Rathgeb (2022). Network intrusion detection in campus environments: Combining Suricata and Zeek.
  34. Chirag Modi,Dhiren Patel,Bhavesh Borisaniya,Avi Patel,Muttukrishnan Rajarajan (2013). A survey on security issues and solutions at different layers of Cloud computing.
  35. Anna Buczak,Erhan Guven (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.
  36. Rebecca Bace,Peter Mell (2001). Intrusion detection systems.
  37. J Kindervag (2010). A “Zero Trust” Model for Security.
  38. A Sharafaldin,A Lashkari,Ghorbani (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization.
  39. (2019). ‘Shareholder engagement’ keys analytics teams’ success at Cisco.
  40. Chirag Modi,Dhiren Patel,Bhavesh Borisaniya,Avi Patel,Muttukrishnan Rajarajan (2013). A survey on security issues and solutions at different layers of Cloud computing.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Dr. Osama Marie. 2026. \u201cModern Network Security Threats and Defense Mechanisms: A Comparative Study of Intrusion Detection and Prevention Systems\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 25 (GJCST Volume 25 Issue E1): .

Download Citation

Issue Cover
GJCST Volume 25 Issue E1
Pg. 11- 17
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Version of record

v1.2

Issue date

October 27, 2025

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 253
Total Downloads: 60
2026 Trends
Related Research

Published Article

Abstract not found

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Modern Network Security Threats and Defense Mechanisms: A Comparative Study of Intrusion Detection and Prevention Systems

Dr. Osama Marie
Dr. Osama Marie Al-Quds Open University

Research Journals