2021 22nd International Arab Conference on Information Technology (ACIT) 2021
DOI: 10.1109/acit53391.2021.9677375
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey for Machine Learning and Deep Learning Applications for Detecting Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…The studies [8][9][10][11][12] illustrate the comparative analysis of ML and DL approaches in intrusion detection. In articles [13][14][15][16], the authors comprehensively explain about the ML algorithms for intrusion detection along with the detailed explanation of the datasets and challenges for modern scenario. Thakkar and Lohiya [17] thoroughly described the taxonomy of IDS along with the techniques used for the evaluation of IDS.…”
Section: Introductionmentioning
confidence: 99%
“…The studies [8][9][10][11][12] illustrate the comparative analysis of ML and DL approaches in intrusion detection. In articles [13][14][15][16], the authors comprehensively explain about the ML algorithms for intrusion detection along with the detailed explanation of the datasets and challenges for modern scenario. Thakkar and Lohiya [17] thoroughly described the taxonomy of IDS along with the techniques used for the evaluation of IDS.…”
Section: Introductionmentioning
confidence: 99%
“…One application where machine learning methods are widely used is intrusion detection systems (IDSs) [1,2]. IDS is employed to monitor the network traffic and identify any unauthorized efforts to access that network through the analysis of incoming and outgoing actions, with the aim of detecting indications of potentially harmful actions [3].…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, this has given rise to significant security threats and underscored the urgency to enhance network security. As a result, numerous researchers have focused their efforts on enhancing intrusion detection systems (IDSs) by improving the detection rate for both novel and known attacks, while concurrently reducing the occurrence of false alarms (false alarm rate or FAR) [1]. Unsupervised intrusion detection techniques have emerged as a solution that eliminates the need for labeled data [4].…”
Section: Introductionmentioning
confidence: 99%