2019 18th IEEE International Conference on Machine Learning and Applications (ICMLA) 2019
DOI: 10.1109/icmla.2019.00187
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Intrusion Detection Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 46 publications
0
12
0
Order By: Relevance
“…Machine learning (ML), a subset of artificial intelligence, is the collective term for all techniques and algorithms that allow computers to automatically learn from vast information using mathematical models [ [25] , [26] , [27] , [28] , [29] ]. Trends and interest in applying machine learning and deep learning-based anomaly detection to handle cyber-attack challenges have increased recently.…”
Section: Data Driven Methods Of Anomaly Detectionmentioning
confidence: 99%
“…Machine learning (ML), a subset of artificial intelligence, is the collective term for all techniques and algorithms that allow computers to automatically learn from vast information using mathematical models [ [25] , [26] , [27] , [28] , [29] ]. Trends and interest in applying machine learning and deep learning-based anomaly detection to handle cyber-attack challenges have increased recently.…”
Section: Data Driven Methods Of Anomaly Detectionmentioning
confidence: 99%
“…๐‘ฅ ๐‘› ) in The closest possible state to the actual value of the output y is used. Therefore, M is a specific observation of a multi-input-one-output data pair such that [36]: (10) ๐‘ฆ ๐‘– = ๐‘“(๐‘ฅ ๐‘–1 . ๐‘ฅ ๐‘–2 .…”
Section: -2-5-gmdh Deep Neural Network (Gmdh-dnn)mentioning
confidence: 99%
“…Based on the functionality, IDSs can be Networkbased, Host-based, and distributed based (Alom et al, 2015;Karatas et al, 2018). Similarly, based on detection methods, intrusion discovery systems can be operating as (i) rule-based (also called anomaly-based), (ii) signature-based (also called misuse-based) while analyzing and detecting attacks, and (iii) hybrid (GรผmรผลŸbaลŸ et al, 2020;Karatas et al, 2018;Macas and Wu, 2020;Chaudhary et al, 2020;Lakshminarayana et al, 2019).…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%
“…Deep Learning algorithms can identify known and unknown attacks, it can manage incomplete, inconsistent, and composite data (Geluvaraj et al, 2019). The authors (Lakshminarayana et al, 2019;Kim and Aminanto, 2017) studied various DL algorithms and then classified DL algorithms into Generative (Unsupervised), Discriminative (Supervised), and Hybrid. Table 8 describes some of the DL techniques under these categories (Sarker, 2022).…”
Section: Deep Learning Solutions To Cyber Securitymentioning
confidence: 99%