Network Security Threats and Intrusion Detection Techniques in the Era of Evolving Cyber Attacks

محتوى المقالة الرئيسي

Noor Thamer Mahmood
Wisam Adnan Kareem
Sarmad Salih Jawad
Murtadha Al-Hasan
Ahmed Abdulrahman Abbas

الملخص

With the rapid expansion of digital networks and the increasing complexity of cyber threats, network security has emerged as a crucial field within information and communications technology (ICT). Modern organizations face growing risks from sophisticated cyber-attacks that threaten the confidentiality, integrity, and availability of critical systems. Intrusion Detection Systems (IDS) have become a foundational tool for identifying and mitigating unauthorized access and suspicious activities within networks. These systems are broadly categorized into Signature-Based Intrusion Detection Systems (SIDS), which rely on known threat patterns, and Anomaly-Based Intrusion Detection Systems (AIDS), which detect deviations from normal behavior to identify unknown attacks. Despite their strengths, both types face significant limitations, including high false-positive rates and challenges in real-time detection.


This study explores the evolving landscape of network security threats and critically analyzes existing intrusion detection techniques. It highlights the integration of alert correlation and prediction mechanisms that enhance early detection and response capabilities. Furthermore, the study addresses key limitations and challenges in IDS implementation and identifies emerging trends aimed at improving scalability, intelligence, and adaptability of detection mechanisms. By evaluating current systems and proposing directions for future research, this work contributes to the development of more robust and proactive network defense strategies in an increasingly interconnected digital world.

المقاييس

يتم تحميل المقاييس...

تفاصيل المقالة

كيفية الاقتباس
Mahmood, N. T. ., Kareem, W. A. ., Jawad, S. S. ., Al-Hasan, M. ., & Abbas, A. A. . (2025). Network Security Threats and Intrusion Detection Techniques in the Era of Evolving Cyber Attacks . مجلة منار الشرق للتربية و تكنولوجيا التعليم, 4(3), 33–43. https://doi.org/10.56961/mejeit.v4i3.1116
القسم
المقالات

Plum Analytics

Artifact Widget