Utilizing IDS and IPS to Improve Cybersecurity Monitoring Process
Sokroeurn Ang ;
Mony Ho ;
Sopheaktra Huy ;
Midhunchakkaravarthy Janarthanan
Published: 2025/07/02
Abstract
Intrusion detection system (IDS) and intrusion prevention system (IPS) are crucial for protecting cyberattacks that target organizational information systems, IDS is focusing on detecting cyberattacks while IPS is focusing on preventing cyberattack. The research examines the limitations of IDS and IPS in detecting and preventing threats, highlighting that both systems rely on signature and anomaly-based detection methods. However, these detection techniques require significant enhancements, as current implementations in IDS and IPS may not effectively address all threats. The main objective of this study is to discover the limitation feature of IDS and IPS in detecting and preventing threats. The data collection and analysis are using a combination of quantitative and qualitative approaches, based on an in-depth review of research and review articles. The analysis shows that attackers can exploit information systems due to the absence of latest signatures and anomaly-based detection in intrusion detection systems (IDS) and intrusion prevention systems (IPS). The findings recommend that cybersecurity professionals should regularly update and verify both signature-based and anomaly-based detection mechanisms, as well as implement both network-based and host-based level to ensure that IDS and IPS can effectively detect and prevent threats in real time.
Keywords
How to Cite the Article
Ang, S., Ho, M., Huy, S., & Janarthanan, M. (2025). Utilizing IDS and IPS to Improve Cybersecurity Monitoring Process. Journal of Cyber Security and Risk Auditing, 2025(3), 77–88.https://doi.org/10.63180/jcsra.thestap.2025.3.7
Utilizing IDS and IPS to Improve Cybersecurity Monitoring Process is licensed under CC BY 4.0
References
- Gupta, N., Jindal, V., & Bedi, P. (2023). A survey on intrusion detection and prevention systems. SN Computer Science, 4(439), 1–5. https://doi.org/10.1007/s42979-023-01926-7
- Otoum, Y., & Nayak, A. (2021). AS-IDS: Anomaly and signature-based IDS for the Internet of Things. Journal of Network and Systems Management, 29(3), 1–24. https://doi.org/10.1007/s10922-021-09589-6
- Quincozes, S. E., Albuquerque, C., Passos, D., & Mossé, D. (2021). A survey on intrusion detection and prevention systems in digital substations. Computer Networks, 184, 8–15. https://doi.org/10.1016/j.comnet.2020.107679
- Hawedi, M., Talhi, C., & Boucheneb, H. (2018). Multi-tenant intrusion detection system for public cloud (MTIDS). Journal of Supercomputing, 74(12), 5201–5208. https://doi.org/10.1007/s11227-018-2572-6
- National Institute of Standards and Technology. (2007, February). Guide to intrusion detection and prevention systems (IDPS) (Special Publication 800-94). https://csrc.nist.gov/publications/detail/sp/800-94/final
- Ring, M., Wunderlich, S., Scheuring, D., Landes, D., & Hotho, A. (2019). A survey of network-based intrusion detection data sets. Computers & Security, 87, 157–163. https://doi.org/10.1016/j.cose.2019.06.005
- Seo, W., & Pak, W. (2021). Real-time network intrusion prevention system based on hybrid machine learning. IEEE Access, 9, 46387–46393. https://doi.org/10.1109/ACCESS.2021.3066620
- Ring, M., Wunderlich, S., Scheuring, D., Landes, D., & Hotho, A. (2019). A survey of network-based intrusion detection data sets. Computers & Security, 87, 148–151. https://doi.org/10.1016/j.cose.2019.06.005
- Garcia, C. F. J., & Blandon, T. E. G. A. (2022). A deep learning-based intrusion detection and prevention system for detecting and preventing denial-of-service attacks. IEEE Access, 10, 83044–83050. https://doi.org/10.1109/ACCESS.2022.319664
- Keegan, N., Ji, S.-Y., Chaudhary, A., Concolato, C., Yu, B., & Jeong, D. H. (2016). A survey of cloud-based network intrusion detection analysis. Human-Centric Computing and Information Sciences, 6(19), 1–17. https://doi.org/10.1186/s13673-016-0076-z
- Ahmad, Z., Khan, A. S., Shiang, C. W., Abdullah, J., & Ahmad, F. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), 1–9. https://doi.org/10.1002/ett.4150
- Sajid, M., Malik, K. R., Almogren, A., Malik, T. S., Khan, A. H., Tanveer, J., & Rehman, A. U. (2024). Enhancing intrusion detection: A hybrid machine and deep learning approach. Journal of Cloud Computing, 13(123), 6–18. https://doi.org/10.1186/s13677-024-00685-x
- Pinto, A., Herrera, L.-C., Donoso, Y., & Gutierrez, J. A. (2023). Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure. Sensors, 23(5), 6–11. https://doi.org/10.3390/s23052415
- Issa, M. M., Aljanabi, M., & Muhialdeen, H. M. (2024). Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations. Journal of Intelligent Systems, 33(1), 15–26. https://doi.org/10.1515/jisys-2023-0248
- Yang, Z., Liu, X., Li, T., Wu, D., Wang, J., Zhao, Y., & Han, H. (2022). A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Computers & Security, 102, 7–17. https://doi.org/10.1016/j.cose.2022.102675
- Kumar, A., Abhishek, K., Ghalib, M. R., Shankar, A., & Cheng, X. (2022). Intrusion detection and prevention system for an IoT environment. Computers & Security, 114, 540–550. https://doi.org/10.1016/j.cose.2022.102675
- Saito, S., Maruhashi, K., Takenaka, M., & Torii, S. (2016). TOPASE: Detection and prevention of brute force attacks with disciplined IPs from IDS logs. Journal of Information Processing, 24(4), 217–224. https://doi.org/10.2197/ipsjjip.24.217
- Aburomman, A. A., & Reaz, I. B. M. (2016). Review of IDS development methods in machine learning. International Journal of Electrical and Computer Engineering (IJECE), 6(6), 2432–2434. https://doi.org/10.11591/ijece.v6i6.12478
- Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 48–53. https://doi.org/10.1016/j.jnca.2012.05.003
- Cañola Garcia, J. F., & Taborda Blandon, G. E. (2022). A deep learning-based intrusion detection and prevention system for detecting and preventing denial-of-service attacks. IEEE Access, 10, 83050–83055. https://doi.org/10.1109/ACCESS.2022.3196642
- Vanin, P., Newe, T., Dhirani, L. L., O'Connell, E., O'Shea, D., Lee, B., & Rao, M. (2022). A study of network intrusion detection systems using artificial intelligence/machine learning. Applied Sciences, 12(21), 10–22. https://doi.org/10.3390/app122211752
- Thakkar, A., & Lohiya, R. (2022). A survey on intrusion detection system: Feature selection, model, performance measures, application perspective, challenges, and future research directions. Artificial Intelligence Review, 55(4), 470–510. https://doi.org/10.1007/s10462-021-10037-9
- Kwon, H.-Y., Kim, T., & Lee, M.-K. (2022). Advanced intrusion detection combining signature-based and behavior-based detection methods. Electronics, 11(6), 2–4. https://doi.org/10.3390/electronics11060867
- Kikissagbe, B. R., & Adda, M. (2024). Machine learning-based intrusion detection methods in IoT systems: A comprehensive review. Electronics, 13(18), 1–2. https://doi.org/10.3390/electronics13183601
- Giri, A. L., & Annamalai, S. (2022). Intrusion detection system for local networks – A review study. In Proceedings of the 2nd International Conference on Advances in Computing, Innovation and Technology in Engineering (ICACITE) (pp. 1388–1391). https://doi.org/10.1109/ICACITE53722.2022.9823433
- Korčák, M., Lámer, J., & Jakab, F. (2014). Intrusion prevention/intrusion detection system (IPS/IDS) for WiFi networks. International Journal of Computer Networks & Communications (IJCNC), 6(4), 78–80. https://doi.org/10.5121/ijcnc.2014.6407
- Jayalaxmi, P. L. S. L. S., Saha, R., Kumar, G., Conti, M., & Kim, T.-H. (2022). Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey. IEEE Access, 10, 121185–121187. https://doi.org/10.1109/ACCESS.2022.3220622
- Chung, C.-J., Khatkar, P., Xing, T., Lee, J., & Huang, D. (2013). NICE: Network intrusion detection and countermeasure selection in virtual network systems. IEEE Transactions on Dependable and Secure Computing, 10(4), 200–210. https://doi.org/10.1109/TDSC.2013.8
- Hart, M., Richardson, E., & Dave, R. (2024). The effects of IDS/IPS placement on big data systems in geo distributed wide area networks. International Journal of Advanced Computer Science and Applications, 15(9), 11–17. https://doi.org/10.14569/IJACSA.2024.0150902
- Ruíz-Lagunas, J. J., Antolino-Hernández, A., Torres-Millarez, C., Paniagua-Villagómez, O., Reyes-Gutiérrez, M. R., & Ferreira-Medina, H. (2019). How to improve the IoT security implementing IDS/IPS tool using Raspberry Pi 3B+. International Journal of Advanced Computer Science and Applications, 10(9), 399–402. https://doi.org/10.14569/IJACSA.2019.0100952
- Niksefat, S., Kaghazgaran, P., & Sadeghiyan, B. (2017). Privacy issues in intrusion detection systems: A taxonomy, survey, and future directions. Computer Science Review, 25, 70–73. https://doi.org/10.1016/j.cosrev.2017.07.001
- Seo, W., & Pak, W. (2021). Real-time network intrusion prevention system based on hybrid machine learning. IEEE Access, 9, 46386–46395. https://doi.org/10.1109/ACCESS.2021.3066620
- KKumar, S., Gupta, S., & Arora, S. (2021). Research trends in network-based intrusion detection systems: A review. IEEE Access, 9, 157761–157774. https://doi.org/10.1109/ACCESS.2021.3129775
- Samrin, R., & Vasumathi, D. (2017). Review on anomaly-based network intrusion detection system. In 2017 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT) (pp. 142–145). https://doi.org/10.1109/ICEECCOT.2017.8284655
- Keegan, N., Ji, S.-Y., Chaudhary, A., Concolato, C., Yu, B., & Jeong, D. H. (2016). A survey of cloud-based network intrusion detection analysis. Human-Centric Computing and Information Sciences, 6(1), 2–14. https://doi.org/10.1186/s13673-016-0076-z
- Bedogni, L., Bousdekis, A., Von Stietencron, M., Pinto, A., Herrera, L.-C., Donoso, Y., & Gutierrez, J. A. A. (2023). Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure. Sensors, 23(5), 2–13. https://doi.org/10.3390/s23052415
- Ho, C.-Y., Lai, Y.-C., Chen, I.-W., Wang, F.-Y., & Tai, W.-H. (2012). Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems. IEEE Communications Magazine, 50(3), 146–153. https://doi.org/10.1109/MCOM.2012.6163595
- Saito, S., Maruhashi, K., Takenaka, M., & Torii, S. (2016). TOPASE: Detection and prevention of brute force attacks with disciplined IPs from IDS logs. Journal of Information Processing, 24, 217–224. https://doi.org/10.2197/ipsjjip.24.217
- Sangaiah, A. K., Javadpour, A., & Pinto, P. (2023). Towards data security assessments using an IDS security model for cyberphysical smart cities. Information Sciences, 617, 2–13. https://doi.org/10.1016/j.ins.2023.119530
- Ahmad, Z., Khan, A. S., Shiang, C. W., Abdullah, J., Ahmad, F., & Khan, A. S. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 31(10), 1–23. https://doi.org/10.1002/ett.4150
- Banu, N., & Sangeetha, S. K. B. K. B. (2025). Intrumer: A multi-module distributed explainable IDS/IPS for securing cloud environment. Computers, Materials & Continua, 72(1), 1–10. https://doi.org/10.32604/cmc.2024.059805
- Behravan, M., & Ghaffarian, S. (2019). A survey of intrusion detection and prevention systems. Journal of Computer Networks and Communications, 2019, 1–9. https://doi.org/10.1155/2019/5368421
- Yadav, S., & Saxena, M. (2020). Reducing false positives in intrusion detection systems using hybrid machine learning algorithms. Future Generation Computer Systems, 107, 107–115. https://doi.org/10.1016/j.future.2019.12.033
- Ahmad, A., & Khan, M. K. (2019). Machine learning-based IDS for reducing false positives in network security. Computers & Security, 87, 101557–101565. https://doi.org/10.1016/j.cose.2019.101557
- Wang, F., & Yao, L. (2020). A deep learning approach for intrusion detection system with reduced false positives. Journal of Network and Computer Applications, 155, 2–10. https://doi.org/10.1016/j.jnca.2020.102530
- Alsmadi, I., & Xu, D. (2015). Security of Software Defined Networks: A survey. Computers & Security, 53, 80–90. https://doi.org/10.1016/j.cose.2015.05.006
- Sharma, A., & Rani, A. (2018). Reducing false positives in intrusion detection systems using ensemble learning. Journal of Computer Science and Technology, 33(5), 1034–1040. https://doi.org/10.1007/s11390-018-1845-6
- Zhao, W., & Zhao, Z. (2024). Providing a hybrid approach to increase the accuracy of intrusion detection systems in computer networks. Journal of Engineering and Applied Science, 71, Article 123, 2–17. https://doi.org/10.1186/s44147-024-00404-y
- Sowmya, T., & Mary Anita, E. A. (2023). A comprehensive review of AI-based intrusion detection system. Measurement: Sensors, 28, Article 100827, 2–10. https://doi.org/10.1016/j.measen.2023.100827
- Spathoulas, G. P., & Katsikas, S. K. (2010). Reducing false positives in intrusion detection systems. Computers & Security, 29(1), 36–40. https://doi.org/10.1016/j.cose.2009.07.008
- Asad, H., Adhikari, S., & Gashi, I. (2024). A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems. International Journal of Information Security, 23, 1332–1342. https://doi.org/10.1007/s10207-023-00794-9