2022
DOI: 10.11591/ijai.v11.i4.pp1607-1614
|View full text |Cite
|
Sign up to set email alerts
|

A survey and analysis of intrusion detection models based on information security and object technology-cloud intrusion dataset

Abstract: Nowadays society, economy, and critical infrastructures have become principally dependent on computers, networks, and information technology solutions, on the other side, cyber-attacks are becoming more sophisticated and thus presenting increasing challenges in accurately detecting intrusions. Failure to prevent intrusions could compromise data integrity, confidentiality, and availability. Different detection methods are proposed to tackle computer security threats, which can be broadly classified into anomaly… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 21 publications
(21 reference statements)
0
2
0
Order By: Relevance
“…Achieving a minimum number of input variables in a dataset is referred to as dimensionality reduction. The drawback of dimensionality [25], is the idea of including extra features in a predictive modeling task which makes it harder to model. Still, these methods can be used in applied ML to simplify classification methods can be used in applied ML to simplify a classification or regression dataset so that a predictive model fits it better.…”
Section: Phase 2: Dimensionality Reduction With Prediction Classifier...mentioning
confidence: 99%
“…Achieving a minimum number of input variables in a dataset is referred to as dimensionality reduction. The drawback of dimensionality [25], is the idea of including extra features in a predictive modeling task which makes it harder to model. Still, these methods can be used in applied ML to simplify classification methods can be used in applied ML to simplify a classification or regression dataset so that a predictive model fits it better.…”
Section: Phase 2: Dimensionality Reduction With Prediction Classifier...mentioning
confidence: 99%
“…They detect odd patterns or suspicious actions by utilizing machine learning and statistical methodologies, potentially identifying unforeseen risks. However, they may generate false positives and require ongoing calibration to reduce such warnings [8]- [12]. A network intrusion detection system (NIDS) is a critical component in identifying ongoing attacks by differentiating normal network traffic from malicious traffic [13].…”
Section: Introductionmentioning
confidence: 99%
“…This insidious form of malicious software effectively takes control of a computer system, encrypts files on the hard drive, or forces the computer to shut down, demanding a ransom in return for restoring normal functionality and obstructing user access to the system. This form of cybercrime has grown exponentially in recent years, targeting businesses, healthcare institutions, government agencies, and individuals [3]. The motivation behind ransomware attacks is often financial gain, and the consequences can be catastrophic, ranging from financial losses to reputational damage.…”
Section: Introductionmentioning
confidence: 99%