2015 2nd World Symposium on Web Applications and Networking (WSWAN) 2015
DOI: 10.1109/wswan.2015.7210351
|View full text |Cite
|
Sign up to set email alerts
|

A survey of intrusion detection system

Abstract: in this paper, we presented a survey on intrusion detection systems (IDS). First, we referred to different mechanisms of intrusion detection. Furthermore, we detailed the types of IDS. We have focused on the application IDS, specifically on the IDS Network, and the IDS in the cloud computing environment. Finally, the contribution of every single type of IDS is described.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 17 publications
0
8
0
2
Order By: Relevance
“…In this study, we choose four popular machine learning algorithms which are k-Nearest Neighbors' algorithm (KNN) (Altman, 1992), Adaptive Boosting (AdaBoost) (Gandhi, 2018), Random Decision Forests (RandomForest) (Ho, 1995) and Support Vector Machine (Cortes and Vapnik, 1995) for our model. The motivation is that those algorithms are recent works on applying machine learning to N-IDS and they provide better results and lower processing time compared to others (Khraisat et al, 2019;Dali et al, 2015). In pattern recognition, the k-Nearest Neighbors' algorithm (k-NN) is a non-parametric method proposed by Thomas Cover used for classification and regression (Altman, 1992).…”
Section: Machine Learning Models To Network Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this study, we choose four popular machine learning algorithms which are k-Nearest Neighbors' algorithm (KNN) (Altman, 1992), Adaptive Boosting (AdaBoost) (Gandhi, 2018), Random Decision Forests (RandomForest) (Ho, 1995) and Support Vector Machine (Cortes and Vapnik, 1995) for our model. The motivation is that those algorithms are recent works on applying machine learning to N-IDS and they provide better results and lower processing time compared to others (Khraisat et al, 2019;Dali et al, 2015). In pattern recognition, the k-Nearest Neighbors' algorithm (k-NN) is a non-parametric method proposed by Thomas Cover used for classification and regression (Altman, 1992).…”
Section: Machine Learning Models To Network Anomaly Detectionmentioning
confidence: 99%
“…An expert system is currently the most feasible solution which uses artificial intelligence to solve problems in a field that requires human expertise. The application of machine learning algorithms is a breakthrough that provide us an efficient tool to apply N-IDS in practice and can be found in detail in (Khraisat et al, 2019;Dali et al, 2015). Moreover, Deep learning is a subset of machine learning that outperforms the traditional machine learning by learning to represent the data as a nested hierarchy of concepts.…”
Section: Introductionmentioning
confidence: 99%
“…So, it is found to be a novel way of detecting intrusions in case of known attacks [2]. But they have failed to identify new attacks which do not exist in the signature and the database needs to be adequately updated to improve the detection rate [3]. For resolving this issue, Anomaly based detection methods perform a comparison of the present client actions over the fixed profile for detecting abnormalities which may be considered an intrusion.…”
Section: Introductionmentioning
confidence: 99%
“…The public cloud platform is very complicated when contrasted with a conventional data center environment. Based on the model of Cloud computing, an institution or organization gives up direct access to significant features of security, provides a high level of trust over the Cloud provider [3][4][5].…”
Section: Introductionmentioning
confidence: 99%