Modern Network Security Threats and Defense Mechanisms: A Comparative Study of Intrusion Detection and Prevention Systems

α
Dr. Salim A S Jayousi
Dr. Salim A S Jayousi

Send Message

To: Author

Modern Network Security Threats and Defense Mechanisms: A Comparative  Study of Intrusion Detection and Prevention Systems

Article Fingerprint

ReserarchID

D20TZ

Modern Network Security Threats and Defense Mechanisms: A Comparative  Study of Intrusion Detection and Prevention Systems Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Generating HTML Viewer...

References

40 Cites in Article
  1. S Axelsson (2000). Intrusion detection systems: A survey and taxonomy.
  2. T El-Darymli,P Sant,D Serpanos (2016). A survey of intrusion detection systems in cloud computing.
  3. R Roesch (1999). Snort-lightweight intrusion detection for networks.
  4. J Kindervag (2010). Build security into your network's DNA: The Zero Trust Network Architecture.
  5. Robin Sommer,Vern Paxson (2010). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.
  6. S Al-Qahtani,A Mahmood,T Alghamdi (2021). A survey on cyber security threats and detection techniques in network intrusion detection system.
  7. R Roesch (1999). Introducing Snort 2.6.
  8. Anna Buczak,Erhan Guven (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.
  9. J Kindervag (2010). No more chewy centers: Introducing the Zero Trust Model of information security.
  10. P Kumar,S Agarwal (2017). Network security threats and solutions for organizations.
  11. W Stallings (2017). Network Security Essentials: Applications and Standards.
  12. D Shackleford (2018). The future of network security: Perimeterless architectures.
  13. J Kindervag (2010). No more chewy centers: Introducing the Zero Trust Model of information security.
  14. L Buczak,E Guven (2016). A survey of data mining and machine learning methods for cyber security intrusion detection.
  15. M Sqalli,M Alenezi (2021). Cloud security: A comprehensive guide to secure cloud computing.
  16. D Douligeris,Serpanos (2004). Network security: Current status and future directions.
  17. Y Liu,Y Xia,M Zhang (2021). A survey on man-inthe-middle attacks.
  18. B Jain,Gupta (2019). A survey of phishing attack techniques, defenses and their implications.
  19. D Greitzer,Frincke (2010). Combining traditional cyber security audit data with psychosocial data: Towards predictive modeling for insider threat mitigation.
  20. J Chen,S Park,J Kim (2018). IoT security issues and challenges.
  21. B Sahu,S Mohapatra (2021). Advanced persistent threat detection and mitigation techniques: A review.
  22. Amin Kharraz,William Robertson,Davide Balzarotti,Leyla Bilge,Engin Kirda (2015). Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.
  23. J Patcha,Park (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends.
  24. Rebecca Bace,Peter Mell (2001). Intrusion detection systems.
  25. S Kumar,E Spafford (1994). A pattern matching model for misuse intrusion detection.
  26. Anna Buczak,Erhan Guven (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.
  27. A Sharafaldin,A Lashkari,Ghorbani (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization.
  28. M Roesch (1999). Introducing Snort 2.6.
  29. Adel Alshamrani,Sowmya Myneni,Ankur Chowdhary,Dijiang Huang (2019). A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities.
  30. L Chen,S Sharma,K Ramakrishnan (2019). Realtime detection of DDoS attacks using adaptive filters.
  31. Ossec (2008). The OSSEC VMware Guest Image.
  32. H Lashkari,M Saad,A Ghorbani (2020). Towards a robust ransomware detection system based on machine learning.
  33. T Dreibholz,S Rathgeb (2022). Network intrusion detection in campus environments: Combining Suricata and Zeek.
  34. D Modi,B Patel,H Borisaniya,A Patel,Rajarajan (2013). A survey on security issues and solutions at different layers of Cloud computing.
  35. Anna Buczak,Erhan Guven (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.
  36. Rebecca Bace,Peter Mell (2001). Intrusion detection systems.
  37. J Kindervag (2010). A “Zero Trust” Model for Security.
  38. Iman Sharafaldin,Arash Habibi Lashkari,Ali Ghorbani (2018). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
  39. (2019). Encrypted Traffic Analytics: Threat Visibility in the Age of Encryption.
  40. Chirag Modi,Dhiren Patel,Bhavesh Borisaniya,Avi Patel,Muttukrishnan Rajarajan (2013). A survey on security issues and solutions at different layers of Cloud computing.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Dr. Salim A S Jayousi. 2026. \u201cModern Network Security Threats and Defense Mechanisms: A Comparative Study of Intrusion Detection and Prevention Systems\u201d. Global Journal of Research in Engineering - F: Electrical & Electronic GJRE-F Volume 25 (GJRE Volume 25 Issue F1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjre

Print ISSN 0975-5861

e-ISSN 2249-4596

Keywords
Version of record

v1.2

Issue date

October 22, 2025

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 265
Total Downloads: 56
2026 Trends
Related Research

Published Article

Abstract not found

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Modern Network Security Threats and Defense Mechanisms: A Comparative Study of Intrusion Detection and Prevention Systems

Dr. Salim A S Jayousi
Dr. Salim A S Jayousi

Research Journals