2022
DOI: 10.1109/access.2022.3186975
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Intrusion Detection System Based on Feature Selection and Weighted Stacking Classifier

Abstract: Cyber-attacks occur more frequently with the rapid growth in the Internet. Intrusion detection systems (IDS) have become an important part of protecting system security. There are still some challenges preventing IDS from further improving its classification performance. Firstly, the complexity of high-dimensional features challenges the speed and the performance of the classification for IDS. Secondly, the classification performance of traditional Stacking algorithm can be easily affected by the base classifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(21 citation statements)
references
References 47 publications
0
9
0
Order By: Relevance
“…There are 250 machines in the attack infrastructure and 620 laptops and desktops, and 40 servers in the victim organization’s network. Dataset analysis and other related principles have been described in detail in published research materials [ 33 , 34 ].…”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…There are 250 machines in the attack infrastructure and 620 laptops and desktops, and 40 servers in the victim organization’s network. Dataset analysis and other related principles have been described in detail in published research materials [ 33 , 34 ].…”
Section: Results and Analysismentioning
confidence: 99%
“…Additional papers [ 23 , 24 , 25 , 26 , 27 , 31 , 32 , 33 , 34 ] presented other approaches to detect DDoS attacks. These include using deep learning [ 25 ], traffic authentication [ 26 ], a cascaded federated deep learning framework [ 25 ], and artificial intelligence merged methods [ 31 ].…”
Section: Related Workmentioning
confidence: 99%
“…Proposed WCGAN-GP [36] WAE-DNN [37] EHHO + GRU [39] Custom CNN + LSTM [43] IG-CS-PSO + RF [45] ABC-BWO-CONV-LSTM [40] RF-RFE + ensemble [44] FOA + ensemble method [42] Bagging BGM [ As the reach of IoT networks grows, the need for efficient IDS like the one presented in this study becomes increasingly critical. Future research efforts will focus on balancing attack category distributions in datasets.…”
Section: Discussionmentioning
confidence: 99%
“…An IDS monitors network and system activities, identifying and responding to unusual behavior that could signal a potential security threat [4]. The cloud infrastructure's dynamic and scalable nature poses unique challenges for intrusion detection, as attacks can manifest in various forms, including DDoS, unauthorized access attempts, and malware injection [16]. IDS in the cloud relies on advanced algorithms and machine learning techniques to analyze massive datasets and detect patterns indicative of malicious activity.…”
Section: The Comprehensive Theoretical Basismentioning
confidence: 99%