2021
DOI: 10.33166/aetic.2021.05.025
|View full text |Cite
|
Sign up to set email alerts
|

A Machine Learning Approach for Improving the Performance of Network Intrusion Detection Systems

Abstract: Intrusion detection systems (IDS) are used in analyzing huge data and diagnose anomaly traffic such as DDoS attack; thus, an efficient traffic classification method is necessary for the IDS. The IDS models attempt to decrease false alarm and increase true alarm rates in order to improve the performance accuracy of the system. To resolve this concern, three machine learning algorithms have been tested and evaluated in this research which are decision jungle (DJ), random forest (RF) and support vector machine (S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4
1

Relationship

3
7

Authors

Journals

citations
Cited by 39 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…The objective of anomaly detection is to use machine learning algorithms to classify anomalous and normal data. Generally, machine learning-based solutions work by analyzing huge amounts of data generated by network traffic, host processes and users to detect suspicious activities using efficient algorithms [15]. Earlier research has demonstrated success with machine learning-based algorithms for intrusion detection systems.…”
Section: Related Workmentioning
confidence: 99%
“…The objective of anomaly detection is to use machine learning algorithms to classify anomalous and normal data. Generally, machine learning-based solutions work by analyzing huge amounts of data generated by network traffic, host processes and users to detect suspicious activities using efficient algorithms [15]. Earlier research has demonstrated success with machine learning-based algorithms for intrusion detection systems.…”
Section: Related Workmentioning
confidence: 99%
“…Authors have designed a worm hole detection technique in the ad-hoc on-demand distance vector routing (AODV) [100] which works using connectivity information of network. Algorithm is used during route discovery when route reply packet is received by sender [101][102][103][104][105][106]. Algorithm is started from destination point and detection process is run with neighbor nodes in elected path (shown in Fig.…”
Section: ) Energy Preserving Worm Hole Identification In Aodvmentioning
confidence: 99%
“…Some of these problems have already been solved with the incorporation of new techniques and technologies to DLPS, such as ML for document classification, the recent study [61] proposes a multilayer framework for insider threat detection based on a hybrid method composed of two predictive models with an accuracy level higher than 97%, another application of ML in data protection are network intrusion detection systems, which can be seen in studies [62], [63], [64]. DRM systems for tracking sensitive information outside the organization, biometric information for user identification, and context-based keys to determine the date, place and time of information access.…”
Section: Limitations Advances and Applicationsmentioning
confidence: 99%