2020
DOI: 10.1016/j.procs.2020.04.133
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
94
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 249 publications
(95 citation statements)
references
References 15 publications
0
94
0
1
Order By: Relevance
“…Evaluation metrics describe the performance of the classification model. The critical point behind the classification is an evaluation metric used to understand the performance and efficiency of an algorithm [58]. Thus, several evaluation metrics mentioned in the experimental results and discussion section were utilized so as to show the performance of the proposed methods.…”
Section: B Results and Discussionmentioning
confidence: 99%
“…Evaluation metrics describe the performance of the classification model. The critical point behind the classification is an evaluation metric used to understand the performance and efficiency of an algorithm [58]. Thus, several evaluation metrics mentioned in the experimental results and discussion section were utilized so as to show the performance of the proposed methods.…”
Section: B Results and Discussionmentioning
confidence: 99%
“…Evaluation metrics describe the performance of the classification model. The critical point behind the classification is an evaluation metric used to understand the performance and efficiency of an algorithm [44]. Building an intelligent detection system capable of detecting various types of network intrusions, one must evaluate the performance of the model via using different evaluation metrics, then compare the results to find the best fit model [45], [46].…”
Section: Evaluation Performance Appropriate Metricsmentioning
confidence: 99%
“…Nevertheless, Saranyaa et al [76] presented a comparative analysis focused on common domain areas of various ML approaches (such as Linear Discriminant Analysis ( LDA), Classification and Regression Trees (CART) and RF) in IDS. An ML-based experiment was also conducted using the KDD'99 cup dataset for IoT applications.…”
Section: Related Review Workmentioning
confidence: 99%