2023
DOI: 10.4018/ijisp.317113
|View full text |Cite
|
Sign up to set email alerts
|

i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security

Abstract: The potential of machine learning mechanisms played a key role in improving the intrusion detection task. However, other factors such as quality of data, overfitting, imbalanced problems, etc. may greatly affect the performance of an intelligent intrusion detection system (IDS). To tackle these issues, this paper proposes a novel machine learning-based IDS called i-2NIDS. The novelty of this approach lies in the application of the nested cross-validation method, which necessitates using two loops: the outer lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…In order to further study the progressiveness of the model in this paper in campus network security intrusion detection, the model proposed in this paper is compared with the existing research. The design experiment compares the model in this paper with literature [21] and literature [22], and evaluates its defense attack effect through expert evaluation. The quantitative evaluation method is the hundred point system.…”
Section: Campus Network Security Intrusion Detection System Based On ...mentioning
confidence: 99%
See 1 more Smart Citation
“…In order to further study the progressiveness of the model in this paper in campus network security intrusion detection, the model proposed in this paper is compared with the existing research. The design experiment compares the model in this paper with literature [21] and literature [22], and evaluates its defense attack effect through expert evaluation. The quantitative evaluation method is the hundred point system.…”
Section: Campus Network Security Intrusion Detection System Based On ...mentioning
confidence: 99%
“…For event generators, their purpose is to retrieve events from the computing environment and provide them to other parts of the system; For event analyzers, analyze the data and obtain analysis results; For the response unit, the functional unit of the actual response analysis results can change the file attributes, issue alarms, or disconnect. For event databases, it mainly stores all intermediate and final data, which can be simple text files or complex databases [21].…”
Section: Introductionmentioning
confidence: 99%
“…Vocational schools should strengthen teacher training and induction training, train high-quality teachers, and provide a better guarantee for the development of network security. [9][10].…”
Section: Big Data Technologymentioning
confidence: 99%
“…Furthermore, password attacks have become commonplace in the present era, with cybercriminals employing sophisticated methods like brute force attacks, statistical attacks, and dictionary attacks to compromise systems and gain access to user accounts. Password hashes, which represent strings generated from passwords, were once considered an effective security measure [6][7][8][9][10]. However, with technological advances, attackers have successfully exploited weaknesses in traditional hashing algorithms, underscoring the urgent need to find more robust and innovative solutions to secure passwords.…”
Section: Introductionmentioning
confidence: 99%