2023
DOI: 10.31026/j.eng.2023.02.11
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers

Abstract: With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create softw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 6 publications
0
1
0
Order By: Relevance
“…Super optimized TCP port surveyor (strobe) is a tool used to perform port scanning or probe service tasks in secure networks and systems running on the UNIX platform. 9 [20] An empirical study to assess Snort's efficacy against network attacks, probing, brute force, and DoS, along with four supervised machine learning classifiers: KNN, decision tree, Bayesian net, and naïve bayes. Using the weka tool, one can evaluate the snort metric, true alarm rate, F-measure, precision, and accuracy and compare them to the same metrics obtained from the use of machine learning algorithms.…”
Section: Appendix Table 1 Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Super optimized TCP port surveyor (strobe) is a tool used to perform port scanning or probe service tasks in secure networks and systems running on the UNIX platform. 9 [20] An empirical study to assess Snort's efficacy against network attacks, probing, brute force, and DoS, along with four supervised machine learning classifiers: KNN, decision tree, Bayesian net, and naïve bayes. Using the weka tool, one can evaluate the snort metric, true alarm rate, F-measure, precision, and accuracy and compare them to the same metrics obtained from the use of machine learning algorithms.…”
Section: Appendix Table 1 Related Workmentioning
confidence: 99%
“…A current research area is being shaped by articles on machine learning techniques, which are among the most widely published. Table 1 (in Appendix) [12]- [20] gives a brief summary of some recent breakthroughs and research in PortScan attack detection.…”
mentioning
confidence: 99%
“…Stein et al [20] constructed an IDS model with artificial neural networks (ANN) based on the same dataset. Authors in [21], [22] proposed the use of decision trees and random forest. In addition, a hybrid approach combining two or more ML algorithms was presented in [23].…”
Section: Introductionmentioning
confidence: 99%