2021
DOI: 10.1016/j.jnca.2021.102983
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey and taxonomy of the SVM-based intrusion detection systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
71
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 173 publications
(72 citation statements)
references
References 38 publications
0
71
0
1
Order By: Relevance
“…Specifically, various Machine Learning (ML) and Deep Learning (DL) models have been developed to classify network traffic data in IoT networks. These models learn the discriminating features of benign traffic and malicious traffic using different architectures such as Random Forest (RF) [ 18 ], Support Vector Machine (SVM) [ 19 ], Deep Neural Network (DNN) [ 20 ], Recurrent Neural Network (RNN) [ 21 ], Long Short-Term Memory (LSTM) [ 22 ] and Gated Recurrent Unit (GRU) [ 23 ]. For an in-depth understanding, comprehensive reviews and surveys on the application of ML and DL in intrusion detection are presented in [ 24 , 25 , 26 , 27 , 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, various Machine Learning (ML) and Deep Learning (DL) models have been developed to classify network traffic data in IoT networks. These models learn the discriminating features of benign traffic and malicious traffic using different architectures such as Random Forest (RF) [ 18 ], Support Vector Machine (SVM) [ 19 ], Deep Neural Network (DNN) [ 20 ], Recurrent Neural Network (RNN) [ 21 ], Long Short-Term Memory (LSTM) [ 22 ] and Gated Recurrent Unit (GRU) [ 23 ]. For an in-depth understanding, comprehensive reviews and surveys on the application of ML and DL in intrusion detection are presented in [ 24 , 25 , 26 , 27 , 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, to demonstrate the model's effectiveness in feature extraction, the extracted features were utilized for training the support vector machine (SVM) classifier and testing it with the same test set. The SVM classifier often shows the best results in many tasks, especially in binary classification (Alzubaidi et al, 2020c, Mohammadi et al, 2021Albashish et al, 2021). Therefore, we employed it in this paper.…”
Section: Feature Extraction In the Proposed Modelmentioning
confidence: 99%
“…Apart from the ones given in this section, many survey articles covering all IDS related studies from past to present have been prepared [24][25][26], and they have been evaluated comparatively regardless of the data set.…”
Section: Related Workmentioning
confidence: 99%