A Comprehensive Analysis on Predictor Models for Intrusion Detection using Mining And Learning Approaches

Network security has emerged as a critical research subject due to the increasing importance of networks in modern life. An Intrusion Detection System (IDS) keeps tabs on the state of the network's software and hardware through the use of intrusion detection. In spite of decades of research, ex...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Intelligent Computing and Control Systems (Online) pp. 869 - 876
Main Authors Kumar, Yadala. Prabhu, Babu, Burra. Vijaya
Format Conference Proceeding
LanguageEnglish
Published IEEE 25.05.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Network security has emerged as a critical research subject due to the increasing importance of networks in modern life. An Intrusion Detection System (IDS) keeps tabs on the state of the network's software and hardware through the use of intrusion detection. In spite of decades of research, existing IDSs still confront difficulties in enhancing detection accuracy, decreasing false alarms, and detecting unknown assaults. Many academics have been working on IDSs that use machine learning and deep learning models to address the security issues. With the help of learning approaches, it is possible to automatically identify the key differences between normal and aberrant data. It is also possible to detect unknown threats using learning approaches because of their excellent generalizability. As a result of its impressive performance, learning researchers have turned their attention to the field of deep learning. An IDS taxonomy based on data objects is analysed in this study to identify and describe IDS literature based on machine learning and deep learning models. In comparison to regular traffic, data-driven network attack detection tends to focus on attack types that are more rare. Simulated systems rather than real-world systems are used to collect many datasets. These difficulties reduce the effectiveness of machine learning models for intrusion detection by training them on fictitious "sandbox" datasets. One such instrument is an IDS, which inspects network traffic in order to ensure the network's confidentiality, integrity, and availability in the case of an intrusion. An in-depth analysis of current NIDS-based models using different learning approaches is examined and presented in this study. This study is useful in identification of numerous threats occurring the network.
ISSN:2768-5330
DOI:10.1109/ICICCS53718.2022.9788246