2022
DOI: 10.1007/978-3-030-91738-8_43
|View full text |Cite
|
Sign up to set email alerts
|

A Suricata and Machine Learning Based Hybrid Network Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…Intrusion detection with deep learning models on zero-day attacks is a highly researched topic [63][64][65][66]. Multiple papers [2,[64][65][66][67][68] claim that the advantage of machinelearning-based intrusion detection systems is the ability to detect zero-day attacks. In the next experiment, we test this claim in the context of multiclass classification.…”
Section: Fourth Experiment: Zero-day Attacksmentioning
confidence: 99%
“…Intrusion detection with deep learning models on zero-day attacks is a highly researched topic [63][64][65][66]. Multiple papers [2,[64][65][66][67][68] claim that the advantage of machinelearning-based intrusion detection systems is the ability to detect zero-day attacks. In the next experiment, we test this claim in the context of multiclass classification.…”
Section: Fourth Experiment: Zero-day Attacksmentioning
confidence: 99%
“…2) CICIDS2017 dataset preprocessing a) Composition of the intial CICIDS2017 dataset: The CICIDS2017 dataset has been chosen to model the network baseline, as it is reliable, up-to-date and can represent the modern real network traffic [33]. However, it poses certain cleaning, scaling and conversion problems for the use by machine learning algorithms [34]. Accordingly, preprocessing operations need to be undertaken before using the benign class to model the network baseline.…”
Section: Data Collectionmentioning
confidence: 99%
“…The abnormal class refers to all the attack classes mentioned in Table I. As a result, over-fitting and under-fitting problems can be generated during the learning phase [35]. www.ijacsa.thesai.org In order to overcome the problems of overfitting and underfitting, the dataset has been balanced to ensure a balanced presence of the different classes.…”
Section: Data Collectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, current hybrid NIDPS designs do not have a method to identify and address these false positives, hindering the learning process of the system. Some researchers have proposed alternative hybrid NIDPS designs that eliminate the dependency on a central database [19]. This research expands on these ideas by introducing a new hybrid NIDPS architecture with two key functionalities: Manual Threat Inspection and Known False Positive Database.…”
mentioning
confidence: 99%