2022
DOI: 10.1051/itmconf/20224602005
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for implementing an ML or DL model to improve Intrusion Detection Systems (IDS) in the NTMA context, with an example on the dataset (CSE-CIC-IDS2018)

Abstract: The objective of this work is to present a framework to be followed to model, test, validate and implement a DL model for anomaly, abuse, malware or botnet detection, with the aim of implementing or improving an Intrusion Detection System (IDS) within the NTMA framework, by means of new machine learning and deep learning techniques, which addresses reliability and processing speed considerations. The said process will be used to perform studies on ML and DL models used for cybersecurity in isolation and in com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The results of each model were evaluated using precision, recall, F 1 score, specificity, and classification accuracy. Precision is the number of true positives as a percentage of the number of predicted positives [59]. Recall is the number of true positives as a percentage of the number of all positives [59].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The results of each model were evaluated using precision, recall, F 1 score, specificity, and classification accuracy. Precision is the number of true positives as a percentage of the number of predicted positives [59]. Recall is the number of true positives as a percentage of the number of all positives [59].…”
Section: Resultsmentioning
confidence: 99%
“…Precision is the number of true positives as a percentage of the number of predicted positives [59]. Recall is the number of true positives as a percentage of the number of all positives [59]. The F 1 score is the harmonic mean of recall and precision [59].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…For the CSE-CIC-IDS2018 dataset, Azeroual et al [11] provided a framework for implementing the DL algorithm to Improve Intrusion Detection Systems (IDS). Using CNN, the model accuracy on validation data decreased to 83.55% after 50 iterations, but it returned a respectable accuracy of 92% after 30 iterations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To accurately evaluate the effectiveness of HXG-BLSTM, we conducted in-depth comparison with the most recent DL algorithms that were employed in the cyber threat detection literature. In this comparison, we used deep learning algorithms from earlier studies such as [11], [28], [10], [32], [1], [9], BWO-CONV-LSTM [27], [48], [45], [6], [18], [21], [42], and [1]. The results of the comparison for deep learning approaches are shown in Table 9.…”
Section: Hxgblstm Vs Other Algorithmsmentioning
confidence: 99%