2018 Fifth HCT Information Technology Trends (ITT) 2018
DOI: 10.1109/ctit.2018.8649498
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Intrusion Detection Models based on NSL-KDD Data Set

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0
3

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(22 citation statements)
references
References 8 publications
0
19
0
3
Order By: Relevance
“…ML is a subset of AI that includes all the methods and algorithms which enable the machines to learn automatically using mathematical models in order to extract useful information from the large datasets 13,55 . The most common ML (also called Shallow Learning) algorithms used for IDS are Decision Tree, K ‐Nearest Neighbor (KNN), Artificial Neural Network (ANN), Support Vector Machine (SVM), K ‐Mean Clustering, Fast Learning Network, and Ensemble Methods.…”
Section: Ai Methods For Nidsmentioning
confidence: 99%
See 1 more Smart Citation
“…ML is a subset of AI that includes all the methods and algorithms which enable the machines to learn automatically using mathematical models in order to extract useful information from the large datasets 13,55 . The most common ML (also called Shallow Learning) algorithms used for IDS are Decision Tree, K ‐Nearest Neighbor (KNN), Artificial Neural Network (ANN), Support Vector Machine (SVM), K ‐Mean Clustering, Fast Learning Network, and Ensemble Methods.…”
Section: Ai Methods For Nidsmentioning
confidence: 99%
“…There are many survey papers in the literature that provide some implementation details on the IDS. Our article is different from the other review articles 11‐16 from three aspects: (i) We followed a systematic article selection process to obtain more focused articles on NIDS design considering AI tools. While the other studies reviewed the general IDS system without using the systematic approach.…”
Section: Introductionmentioning
confidence: 99%
“…Using machine learning algorithms in Intrusion Detection System (IDS) is an attracting research area for cyber security researchers around the world [5][6][7][8][9][10][11][12][13][14]. In this research, experiments were made based on classifying NSL-KDD dataset to either normal or attack.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The preprocessing steps are needed to prepare the data before it is analyzed using a machine learning algorithm. Therefore, the preprocessing step is an important step in Machine Learning algorithm and may impact the detection rate [31].…”
Section: Relevant Workmentioning
confidence: 99%