The Intrusion Detection and Intrusion Prevention Systems

A special issue of Applied System Innovation (ISSN 2571-5577). This special issue belongs to the section "Information Systems".

Deadline for manuscript submissions: 30 July 2025 | Viewed by 817

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Computer Science, Dalhousie University, Halifax, NS B3H 1W5, Canada
Interests: cyber security; risk mitigation; emerging wireless technologies; mobile computing; applications of near field communications (NFC); radio frequency identification (RFID) systems; smartphones; sensor networks and body area networks
Special Issues, Collections and Topics in MDPI journals

E-Mail
Guest Editor
1. Cistel Technology Inc., 30 Concourse Gate, Nepean, ON K2E 7V7, Canada
2. Faculty of Computer Science, Dalhousie University, 6299 South St., Halifax, NS, Canada
Interests: machine learning; software engineering; VoIP communication; cyber security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
1. Cistel Technology Inc., 30 Concourse Gate, Nepean, ON K2E 7V7, Canada
2. Emerging Wireless Technologies Research Laboratory, Faculty of Computer Science, Dalhousie University, Halifax, NS B3H 1W5, Canada
Interests: vulnerability assessments; SCADA security; intrusion detection and prevention systems; cryptographic algorithms; post-quantum cryptography; IoT security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Are you ready to dive into the cutting-edge world of cybersecurity? Join us in exploring the dynamic realm of Intrusion Detection and Intrusion Prevention Systems (IDIPS), where every click, every line of code, and every network packet matters.

In today’s digital landscape, where data breaches and cyber threats loom large, the significance of IDIPS cannot be overstated. These systems serve as the first line of defense, tirelessly monitoring, analyzing, and thwarting potential intrusions to safeguard sensitive information and preserve digital integrity. We are pleased to invite you to embark on this journey of discovery and innovation. This Special Issue is not merely another publication opportunity; it is a call to arms for researchers, practitioners, and enthusiasts alike to converge and push the boundaries of knowledge in this critical field.

This Special Issue represents a vast canvas, where the possibilities are endless. We welcome original research articles and reviews spanning a spectrum of themes and methodologies. In this collaborative endeavor, your expertise and insights are invaluable. We look forward to receiving your contributions!

Prof. Dr. Srinivas (Srini) Sampalli
Dr. Marzia Zaman
Dr. Darshana Upadhyay
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied System Innovation is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • innovative intrusion detection techniques
  • next-generation intrusion prevention systems
  • threat intelligence and behavioral analysis
  • scalability and performance optimization
  • network traffic analysis and forensics
  • zero-day threat detection and response
  • intrusion detection system in SCADA-based ICSs
  • intrusion prevention system in SCADA-based ICSs
  • cross-layer defense mechanisms
  • human-centric security and usability
  • privacy-preserving intrusion detection
  • interoperability and standardization
  • anomaly-based detection algorithms
  • signature-based detection methods
  • host-based intrusion detection systems (HIDS)
  • network-based intrusion detection systems (NIDS)
  • protocol-based intrusion detection systems
  • machine learning in intrusion detection
  • adaptive and self-learning IPS solutions
  • application layer intrusion detection and prevention
  • content-based intrusion detection techniques
  • intrusion detection system integration with SIEM (security information and event management)
  • evasion techniques and countermeasures for IDS/IPS
  • hybrid intrusion detection and prevention architectures
  • real-time threat intelligence integration into IDS/IPS
  • intrusion detection in cloud environments
  • intrusion prevention in IoT (Internet of Things) networks
  • reinforcement learning for intrusion detection and prevention
  • generative adversarial networks (GANs) in intrusion detection
  • explainable AI techniques for IDS and IPS
  • deep learning models for anomaly detection in network traffic
  • transfer learning approaches for IDS and IPS
  • federated learning for distributed intrusion detection systems
  • ensemble methods in intrusion detection and prevention
  • deep reinforcement learning for adaptive IPS policies
  • cognitive models for human-in-the-loop intrusion analysis
  • adversarial machine learning for robust IDS and IPS
  • graph-based intrusion detection and prevention systems
  • reinforcement learning for dynamic firewall policy management
  • explainable anomaly detection models for network intrusion detection
  • reinforcement learning for self-adaptive intrusion response
  • interpretability techniques for neural network-based IDS and IPS models

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 3059 KiB  
Article
OFF-The-Hook: A Tool to Detect Zero-Font and Traditional Phishing Attacks in Real Time
by Nazar Abbas Saqib, Zahrah Ali AlMuraihel, Reema Zaki AlMustafa, Farah Amer AlRuwaili, Jana Mohammed AlQahtani, Amal Aodah Alahmadi, Deemah Alqahtani, Saad Abdulrahman Alharthi, Sghaier Chabani and Duaa Ali AL Kubaisy
Appl. Syst. Innov. 2025, 8(4), 93; https://doi.org/10.3390/asi8040093 - 30 Jun 2025
Viewed by 253
Abstract
Phishing attacks continue to pose serious challenges to cybersecurity, with attackers constantly refining their methods to bypass detection systems. One particularly evasive technique is Zero-Font phishing, which involves the insertion of invisible or zero-sized characters into email content to deceive both users and [...] Read more.
Phishing attacks continue to pose serious challenges to cybersecurity, with attackers constantly refining their methods to bypass detection systems. One particularly evasive technique is Zero-Font phishing, which involves the insertion of invisible or zero-sized characters into email content to deceive both users and traditional email filters. Because these characters are not visible to human readers but still processed by email systems, they can be used to evade detection by traditional email filters, obscuring malicious intent in ways that bypass basic content inspection. This study introduces a proactive phishing detection tool capable of identifying both traditional and Zero-Font phishing attempts. The proposed tool leverages a multi-layered security framework, combining structural inspection and machine learning-based classification to detect both traditional and Zero-Font phishing attempts. At its core, the system incorporates an advanced machine learning model trained on a well-established dataset comprising both phishing and legitimate emails. The model alone achieves an accuracy rate of up to 98.8%, contributing significantly to the overall effectiveness of the tool. This hybrid approach enhances the system’s robustness and detection accuracy across diverse phishing scenarios. The findings underscore the importance of multi-faceted detection mechanisms and contribute to the development of more resilient defenses in the ever-evolving landscape of cybersecurity threats. Full article
(This article belongs to the Special Issue The Intrusion Detection and Intrusion Prevention Systems)
Show Figures

Figure 1

Back to TopTop