2010
DOI: 10.1007/s10462-010-9179-5
|View full text |Cite
|
Sign up to set email alerts
|

The use of artificial intelligence based techniques for intrusion detection: a review

Abstract: The Internet connects hundreds of millions of computers across the world running on multiple hardware and software platforms providing communication and commercial services. However, this interconnectivity among computers also enables malicious users to misuse resources and mount Internet attacks. The continuously growing Internet attacks pose severe challenges to develop a flexible, adaptive security oriented methods. Intrusion detection system (IDS) is one of most important component being used to detect the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
61
0
2

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 115 publications
(64 citation statements)
references
References 47 publications
1
61
0
2
Order By: Relevance
“…They have the capability to learn any nonlinear relationship between input and desired output even in the presence of noisy training data. Interested readers may explore review of ML techniques mentioned in the studies 11,14,28 . The ML techniques from different categories implemented in ML tool WEKA are used to produce trained models for malware dataset having bifurcation of 70% as training and 30% test dataset.…”
Section: Classification Phasementioning
confidence: 99%
“…They have the capability to learn any nonlinear relationship between input and desired output even in the presence of noisy training data. Interested readers may explore review of ML techniques mentioned in the studies 11,14,28 . The ML techniques from different categories implemented in ML tool WEKA are used to produce trained models for malware dataset having bifurcation of 70% as training and 30% test dataset.…”
Section: Classification Phasementioning
confidence: 99%
“…Must therefore be larger than the normal cluster is a cluster of intrusion data. The normal behavior of intrusion detection systems and describe clusters grouped as normal as normal cluster signature is used for diagnosis [7]. In clustering, analysis, and grouping objects into clusters is performed, so that objects within a cluster are similar to each other.…”
Section: Clustering Algorithms In Intrusion Detection Systemsmentioning
confidence: 99%
“…This, in combination with their ability to generalize from learning data, has made them a proper approach to ID. In order to apply this approach to ID, data representing attacks and non-attacks have to be introduced to the NN to adjust automatically network coefficients during the training phase [27]. Multilayer perceptron (MLP) and There were researches implement an IDS using MLP, which has the capability of detecting normal and attacks connection as in [54] and [48].…”
Section: Supervised Neural Network (Nn)mentioning
confidence: 99%