2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) 2019
DOI: 10.1109/iccmc.2019.8819748
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Machine Learning Methodologies for Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…This section recalls the works [7][8][9][10][11][12][13][14][15][16][17][18][19][20] from which inspiration was taken for the application of ML models and to make a comparison between the state-of-the-art results and the results achieved by the techniques we presented in the next sections.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This section recalls the works [7][8][9][10][11][12][13][14][15][16][17][18][19][20] from which inspiration was taken for the application of ML models and to make a comparison between the state-of-the-art results and the results achieved by the techniques we presented in the next sections.…”
Section: Related Workmentioning
confidence: 99%
“…The review in [7] intends to provide an exhaustive survey of the currently proposed ML-based intrusion detection systems to assist network intrusion detection system developers to gain a better intuition. The usefulness of this paper is to summarize the fundamental concept of ML and the intrusion detection problem, but in fact it does not present an innovative method or operational procedure of learning-model design as it is done in next sections of our paper.…”
Section: Related Workmentioning
confidence: 99%
“…However, a method that relies on patterns for existing attacks has a disadvantage in that it is impossible to detect an attack that is not known beforehand, and the network is easily penetrated by a variant of an existing attack. To solve this problem, various methods have been proposed and applied to the NIDS [6] [7]. The machine learning-based NIDS (ML-NIDS), which has recently received the most attention, was evaluated as an alternative that can significantly improve the shortcomings of the pattern matching NIDS (PM-NIDS).…”
Section: Introductionmentioning
confidence: 99%
“…Machine Learning (ML) techniques widely used in computer security data sets have recently become a trend in security technology [13]. It contributes to analyses and handling the massive amount of data and extracts the essential features that are used in various techniques for feature selection [14]. IDS is a commonly used machine learning classifier to distinguish between various attacks as a class [15].…”
Section: Introductionmentioning
confidence: 99%