2017
DOI: 10.25007/ajnu.v6n3a90
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Intrusion Detection Systems

Abstract: The transformation of vast amount of information through the network channels appeared widely from one site to another and these information may be disclosed to the third party or the attackers. Thus, the protection process of transformed information is a complex process that can be established through the Intrusion Detection System (IDS). Concealment and unity of information are the most important issues achieved through the intrusion detection system. The process of intrusion detection can be used with wirel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 12 publications
(14 reference statements)
0
7
0
Order By: Relevance
“…Denning introduced the technique of detecting intrusion, and since then researchers have worked hard to automatically detect intrusions in network systems [6]. Intrusion detection systems have been defined as the technique of using artificial intelligence, machine learning, and database systems to uncover malicious patterns in large datasets [2]. IDS can be broadly classified into two major categories, anomaly-based IDS and misuse-based IDS.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Denning introduced the technique of detecting intrusion, and since then researchers have worked hard to automatically detect intrusions in network systems [6]. Intrusion detection systems have been defined as the technique of using artificial intelligence, machine learning, and database systems to uncover malicious patterns in large datasets [2]. IDS can be broadly classified into two major categories, anomaly-based IDS and misuse-based IDS.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…ey monitor the normal operations of the system, and if they detect an anomaly, a flag is raised. Instead of keeping all patterns of well-known malicious dataset and updating as new patterns emerge, anomaly detection systems outline "normal" operations of a system and flag anything that deviates from the outline [2]. According to [7], anomaly IDS contains three stages: parameterization, training stage, and detection stage.…”
Section: Anomaly-based Intrusion Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Traditional cybersecurity methods (e.g., firewalls, user authentication, and data encryption) cannot handle the complex attacks that take place online. Intrusion detection systems (IDSs) are designed to detect a variety of anomalous patterns that serve as the attack signatures of new and known attacks [3], using advanced database systems with machine learning [4]. When an IDS reports potential malicious activities in an information system [5], it kicks off various analytical and alerting processes to confirm the nature of the attack and launch protection measures.…”
Section: Introductionmentioning
confidence: 99%
“…(3) To improve data-level class balancing, we provide an ingenious combination of random undersampling (RUS) and synthetic minority oversampling to adjust the data distribution structure and improve minority class detection. (4) To improve algorithm-level class balancing, we apply a hybrid convolutional neural network (CNN) and a Transformer model to adopt new detection performance efficiencies over contemporary models. Our model's performance is compared with that of state-ofthe-art IDS models, demonstrating that our innovations have clear advantages in terms of accuracy, FP rate, and recall.…”
Section: Introductionmentioning
confidence: 99%