A Comprehensive Analysis on Predictor Models for Intrusion Detection using Mining And Learning Approaches
Network security has emerged as a critical research subject due to the increasing importance of networks in modern life. An Intrusion Detection System (IDS) keeps tabs on the state of the network's software and hardware through the use of intrusion detection. In spite of decades of research, ex...
Saved in:
Published in | International Conference on Intelligent Computing and Control Systems (Online) pp. 869 - 876 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
25.05.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Network security has emerged as a critical research subject due to the increasing importance of networks in modern life. An Intrusion Detection System (IDS) keeps tabs on the state of the network's software and hardware through the use of intrusion detection. In spite of decades of research, existing IDSs still confront difficulties in enhancing detection accuracy, decreasing false alarms, and detecting unknown assaults. Many academics have been working on IDSs that use machine learning and deep learning models to address the security issues. With the help of learning approaches, it is possible to automatically identify the key differences between normal and aberrant data. It is also possible to detect unknown threats using learning approaches because of their excellent generalizability. As a result of its impressive performance, learning researchers have turned their attention to the field of deep learning. An IDS taxonomy based on data objects is analysed in this study to identify and describe IDS literature based on machine learning and deep learning models. In comparison to regular traffic, data-driven network attack detection tends to focus on attack types that are more rare. Simulated systems rather than real-world systems are used to collect many datasets. These difficulties reduce the effectiveness of machine learning models for intrusion detection by training them on fictitious "sandbox" datasets. One such instrument is an IDS, which inspects network traffic in order to ensure the network's confidentiality, integrity, and availability in the case of an intrusion. An in-depth analysis of current NIDS-based models using different learning approaches is examined and presented in this study. This study is useful in identification of numerous threats occurring the network. |
---|---|
ISSN: | 2768-5330 |
DOI: | 10.1109/ICICCS53718.2022.9788246 |