EVOLUTION OF INTRUSION DETECTION: THEORETICAL FOUNDATIONS, SYSTEM ARCHITECTURES, AND REAL- WORLD PRACTICES

Authors

  • Muhammad Usama Nazir Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia
  • Asri Bin Ngadi Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia
  • Farkhana Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia

DOI:

https://doi.org/10.63878/cjssr.v3i4.1376

Keywords:

Intrusion Detection System (IDS), Signature-Based Detection, Anomaly-Based Detection, Hybrid IDS, Host-Based IDS (HIDS), Network-Based IDS (NIDS), Information Theory, Entropy, Statistical Modeling, Machine Learning (ML), Deep Learning (DL), Convolutional Neural Networks (CNN).

Abstract

With the exponential growth of digital networks and the increasing sophistication of cyber threats, intrusion detection systems (IDS) have emerged as a critical component in maintaining information security. IDS technologies monitor, detect, and respond to unauthorized activities or anomalies within networked environments. This article explores the foundational theories underpinning intrusion detection, examines prevalent frameworks and architectures, and

analyzes established and emerging models such as signature-based, anomaly-based, and hybrid detection systems. Additionally, it highlights practical implementations of IDS across various industries and reviews the effectiveness of current approaches using performance metrics like accuracy, false positive rates, and detection latency. The paper concludes with a discussion on the challenges facing modern IDS, including scalability, evasion techniques, and the integration of artificial intelligence, and outlines future research directions to enhance adaptive and

intelligent intrusion detection mechanisms.

Downloads

Download data is not yet available.

Downloads

Published

2025-10-12

How to Cite

EVOLUTION OF INTRUSION DETECTION: THEORETICAL FOUNDATIONS, SYSTEM ARCHITECTURES, AND REAL- WORLD PRACTICES. (2025). Contemporary Journal of Social Science Review, 3(4), 1-30. https://doi.org/10.63878/cjssr.v3i4.1376