2022
DOI: 10.3390/app122211752
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning

Abstract: The rapid growth of the Internet and communications has resulted in a huge increase in transmitted data. These data are coveted by attackers and they continuously create novel attacks to steal or corrupt these data. The growth of these attacks is an issue for the security of our systems and represents one of the biggest challenges for intrusion detection. An intrusion detection system (IDS) is a tool that helps to detect intrusions by inspecting the network traffic. Although many researchers have studied and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(11 citation statements)
references
References 31 publications
0
7
0
Order By: Relevance
“…CFS is frequently paired with search algorithms like forward selection, backward elimination, and bi-directional search to take into consideration the significant computational burden of evaluating all candidate feature subsets. In this investigation, we used the sci-kit-learn version of CFS 45 , which employs symmetrical uncertainty 46 as the correlation metric and stops searching the subset space after five successive fully enlarged non-improving subsets.…”
Section: Methodsmentioning
confidence: 99%
“…CFS is frequently paired with search algorithms like forward selection, backward elimination, and bi-directional search to take into consideration the significant computational burden of evaluating all candidate feature subsets. In this investigation, we used the sci-kit-learn version of CFS 45 , which employs symmetrical uncertainty 46 as the correlation metric and stops searching the subset space after five successive fully enlarged non-improving subsets.…”
Section: Methodsmentioning
confidence: 99%
“…In the context of H-IoT, machine learning is beneficial for remote monitoring and real-time treatment of diseases [19], [148]. ML algorithms such as Support Vector Machines (SVMs), decision trees, random forests, and Artificial Neural Networks (ANNs) can analyze huge volumes of medical data collected by healthcare-related smart devices, including vital signs and medical histories [149]. In this process, ML techniques are applied to analyze massive datasets to find patterns and generate insights that may assist clinical decisions, improve patient outcomes, and reduce healthcare expenditures.…”
Section: A Machine Learning With Cloud Computingmentioning
confidence: 99%
“…NIDS come in two general forms; signature based NIDS and heuristic based NIDS. These two types of NIDS provide a varying degree [5].…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Hybrid detection combines both of the aforementioned detections. Generally, they have a lower false detection rate than anomaly techniques and can discover new attacks [5].…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%