2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC) 2020
DOI: 10.1109/icsidempc49020.2020.9299584
|View full text |Cite
|
Sign up to set email alerts
|

NIDS-Network Intrusion Detection System Based on Deep and Machine Learning Frameworks with CICIDS2018 using Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 2 publications
1
6
0
Order By: Relevance
“…Similarly, in [9]- [13] supervised learning of known models in the literature is used, where minor modifications in the numerical optimisation algorithms are proposed, referring only to the UNSW-NB15 dataset for the evaluation of the obtained performance. Similar arguments apply to other works in the recent literature, such as [14]- [16], in which the authors present results related to the performance of proposed methods or classical ML/AI models considering only one type of dataset such as the CSE-CIC-IDS-2018. The great limitation of the proposed techniques lies in the fact that a priori knowledge of the types of threats that can affect the computer network is required.…”
Section: B Related Worksupporting
confidence: 78%
See 1 more Smart Citation
“…Similarly, in [9]- [13] supervised learning of known models in the literature is used, where minor modifications in the numerical optimisation algorithms are proposed, referring only to the UNSW-NB15 dataset for the evaluation of the obtained performance. Similar arguments apply to other works in the recent literature, such as [14]- [16], in which the authors present results related to the performance of proposed methods or classical ML/AI models considering only one type of dataset such as the CSE-CIC-IDS-2018. The great limitation of the proposed techniques lies in the fact that a priori knowledge of the types of threats that can affect the computer network is required.…”
Section: B Related Worksupporting
confidence: 78%
“…It can also be stated that our results are fully comparable with the state of the art on ADS/IDS systems based on binary classifiers, which need to be trained with inputs from both classes (normal) and anomaly. In fact, [4]- [7] adopts KNN and ANN models and obtains an accuracy of 97% (only on KDD99 dataset); in [9]- [13] and [42], authors report the results of binary classifiers applied on UNSW-NB15 highlighting mean accuracy level around 95% with also some high FPR rate; in [14]- [16] and [43] it is reported a comparison of supervised machine learning (SVM, DT, DA) and deep learning (ANN, CNN, Autoencoder) models applied to CSE-CIC-IDS-2018, reveling an accuracy level close to 98%, for binary classifiers; in [35] the authors report the results of binary classifier applied on EDGE-IIOTSET 2022 using different type of machine learning (DT, RF, SVM) and deep learning (DNN) methods that provide an accuracy level of 99%. Summarizing, our method reaches a very similar level of detection performance, with low FPR respect some of Note that, in order not have dependency issues with respect to the computational platform, the SVM and ELM models have been re-implemented following the design specifications reported by the authors cited in Section A.II.…”
Section: Resultsmentioning
confidence: 99%
“…For example, the needs of companies are changing, and advanced technologies are being developed accordingly. According to study [14], one primary future direction is using machine learning and AI techniques in NIDS to improve its ability to detect threats. Since cybersecurity attacks are becoming very common these days, these technologies can help companies monitor their security systems in real time.…”
Section: F Future Directions and Challenges For Nids In Cloud Environ...mentioning
confidence: 99%
“…Other datasets suffer from the negative effects of low traffic variety and volumes; do not cover the range of attacks; and anonymize bundle data and payload, which cannot reflect current patterns, or they must include set and metadata. Prakash et al [29] present an experimental method for deep and machine learning networks with hyperactive boundary improvements using a convenient IDS digital dataset (CIC-CSE-IDS-2018) considering the maximum frontier attack (PCAP). Liu et al [30] develop an outlier detection algorithm that generates artificial outliers using the generative adversarial active learning (GAAL) framework.…”
Section: Common Nids Usagementioning
confidence: 99%