2013
DOI: 10.5120/13608-1412
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Intrusion Detection System using Machine Learning Techniques

Abstract: In today's world, almost everybody is affluent with computers and network based technology is growing by leaps and bounds. So, network security has become very important, rather an inevitable part of computer system. An Intrusion Detection System (IDS) is designed to detect system attacks and classify system activities into normal and abnormal form. Machine learning techniques have been applied to intrusion detection systems which have an important role in detecting Intrusions. This paper reviews different mac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…Some machine learning methods have been applied with the hope of improving detection rates and adaptive capability [36]. …”
Section: Simulation In Big Data Stream: Intrusion Detection Systemmentioning
confidence: 99%
“…Some machine learning methods have been applied with the hope of improving detection rates and adaptive capability [36]. …”
Section: Simulation In Big Data Stream: Intrusion Detection Systemmentioning
confidence: 99%
“…Machine learning methods [3]- [8] have been widely used in intrusion detection to identify malicious traffic. However, these methods belong to shallow learning and often emphasize feature engineering and selection.…”
Section: Introductionmentioning
confidence: 99%
“…Over the years, several survey papers (e.g., Kwon et al, 3 Tong et al, 4 Gardiner and Nagaraja, 5 Shanbhogue and Beena, 8 Liu et al, 9 Bou-Harb et al, 10 Luh et al, 11 Shabut et al, 12 Humayed et al, 13 Wang et al, 14 Deng et al, 15 Bou-Harb, 16 Beasley et al, 17 Ucci et al, 18 Ye et al, 19 Bazrafshan et al, 20 Souri and Hosseini, 21 Barriga and Yoo, 22 Bontupalli and Taha, 23 Buczak and Guven, 24 Resende and Drummond, 25 KishorWagh et al, 26 Liu et al, 27 Sultana et al, 28 Gupta et al, 29 and Wang et al 33 ) and case studies (e.g., Al-Enezi et al 31 and Alotaibi et al 32 ) on the use of computational intelligence in cybersecurity have been published, but with limited scope. For instance, Humayed et al, 13 Wang et al, 14 Deng et al, 15 Bou-Harb, 16 and Beasley et al 17 discussed only cybersecurity related to cyber-physical systems (e.g., smart grid 33 ) or specific applications (e.g., block-chain 34 ), while Ucci et al, 18 Ye et al, 19 Bazrafshan et al, 20 Souri and Hosseini, 21 and Barriga and Yoo 23 gave details about DM and ML techniques used for malware detection.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, Humayed et al, 13 Wang et al, 14 Deng et al, 15 Bou-Harb, 16 and Beasley et al 17 discussed only cybersecurity related to cyber-physical systems (e.g., smart grid 33 ) or specific applications (e.g., block-chain 34 ), while Ucci et al, 18 Ye et al, 19 Bazrafshan et al, 20 Souri and Hosseini, 21 and Barriga and Yoo 23 gave details about DM and ML techniques used for malware detection. Similarly, Bontupalli and Taha, 23 Buczak and Guven, 24 Resende and Drummond, 25 and KishorWagh et al 26 focused only on the IDS and its related ML approaches, whereas Liu et al 35 and Kwon et al 3 studied, respectively, insider threats and DL-based anomaly detection. Furthermore, Sultana et al 28 provided a review on ML and DL security techniques in the IoTs, Gupta et al 29 surveyed the literature on phishing attacks, and Wang et al 30 elucidated about the game-theoretic approach used for cybersecurity.…”
Section: Introductionmentioning
confidence: 99%