2021 IEEE International Conference on Automatic Control &Amp; Intelligent Systems (I2CACIS) 2021
DOI: 10.1109/i2cacis52118.2021.9495897
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Systems Based on Machine Learning Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…It comprises of a massive number of decision trees, often known as estimators as shown in figure 8. Each node in the tree is taught to make its predictions using a separate set of observations [31]. The random forest's final predictions are then calculated by averaging the forecasts of each tree.It is solved by eqs.…”
Section: Fig 8 Random Forest Architecture [31]mentioning
confidence: 99%
“…It comprises of a massive number of decision trees, often known as estimators as shown in figure 8. Each node in the tree is taught to make its predictions using a separate set of observations [31]. The random forest's final predictions are then calculated by averaging the forecasts of each tree.It is solved by eqs.…”
Section: Fig 8 Random Forest Architecture [31]mentioning
confidence: 99%
“…For feature selection in IDS, Correlation Feature Selection (CFS) and BestFirst search have been merged, resulting in reduced feature dimensions while maintaining excellent detection accuracy [4]. To increase classification performance and reduce false positive rates, hybrid approaches combining machine learning algorithms with heuristic methods for feature selection have also been developed [12].…”
Section: Related Workmentioning
confidence: 99%
“…Authors in the article [24] introduces a hybrid machine learning approach that combines feature selection and data reduction methods, using feature importance decision treebased methods and the Local Outlier Factor (LOF) method to achieve high accuracy in detecting network anomalies, particularly in the NSL-KDD dataset, demonstrating superior stability compared to other methods, albeit facing challenges in the UNSW-NB15 dataset. In this paper [25] proposes a taxonomy for Intrusion Detection Systems (IDS) based on deep learning, categorizing IDS literature primarily by data objects and evaluates the performance of three machine learning algorithms (Bayes Net, Random Forest, Neural Network) and two deep learning algorithms (RNN, LSTM) using the KDD cup 99 dataset for accuracy assessment with the WEKA program. In this study [26], Support Vector Machine (SVM) and Naïve Bayes machine learning techniques are employed for intrusion detection using the NSL-KDD dataset, with SVM demonstrating superior performance compared to Naïve Bayes, as measured by accuracy and misclassification rates.…”
Section: Related Workmentioning
confidence: 99%