2019
DOI: 10.1109/comst.2018.2847722
|View full text |Cite
|
Sign up to set email alerts
|

A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
283
0
7

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 512 publications
(290 citation statements)
references
References 150 publications
0
283
0
7
Order By: Relevance
“…This means that a device must not be permanently "blocked" after the occurrence of a DDoS attack was enabled in some degree by that device. We also think that machine learning techniques [29,30] can complement and enhance our rule-based detection mechanism, giving it the capability of detecting new and sophisticated cyber-attacks. Aligned with [31], we also think that the best and effective approach to battle against DDoS attacks is to build a defense mechanism as close as possible to the attack source that generates rogue traffic.…”
Section: Discussionmentioning
confidence: 99%
“…This means that a device must not be permanently "blocked" after the occurrence of a DDoS attack was enabled in some degree by that device. We also think that machine learning techniques [29,30] can complement and enhance our rule-based detection mechanism, giving it the capability of detecting new and sophisticated cyber-attacks. Aligned with [31], we also think that the best and effective approach to battle against DDoS attacks is to build a defense mechanism as close as possible to the attack source that generates rogue traffic.…”
Section: Discussionmentioning
confidence: 99%
“…Mishra.et al [6] done surveys on machine learning based IDS usingmixture of all IDS datasets mostly used DARPA [7], KDD'99 [8] [9]and NSL-KDD[10] and other datasets. Many IDS researchers have applied their Intrusion Detection System on one or more datasets.…”
Section: Related Workmentioning
confidence: 99%
“…The existing datasets do not represent the comprehensive representation of the modern orientation of network traffic and attack scenarios.These reasons have instigated a serious challenge for the cyber security research group at the Australian Centre for Cyber Security (ACCS) and other researchers of this domain around the globe. The raw network packets of the UNSW-NB15 dataset [6]…”
Section: Unsw-nb15 Datasetmentioning
confidence: 99%
“…Therefore, our goal is only to generate an example model that can be replaced or customized in future framework applications. Besides, we choose the Random Forest algorithm because it is one of the most popular ensemble classifiers and has been widely used as a technique for intrusion detection …”
Section: The Framertp4 Frameworkmentioning
confidence: 99%