2016
DOI: 10.17485/ijst/2016/v9i11/89264
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Intrusion Detection System: State of the Art Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…Furthermore, have been presented some recent research works related to machine learning-based security designs for IoT and Industrial IoT. FARAHNAKIAN and Haikonen [21] presented a deep autoencoder model for identifying network attacks. The researchers used the KDD-CUP 99 dataset to evaluate their proposed design.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, have been presented some recent research works related to machine learning-based security designs for IoT and Industrial IoT. FARAHNAKIAN and Haikonen [21] presented a deep autoencoder model for identifying network attacks. The researchers used the KDD-CUP 99 dataset to evaluate their proposed design.…”
Section: Related Workmentioning
confidence: 99%
“…A higher detection rate indicates be er system performance. Accuracy is calculated using equation (21), representing how well the system has correctly identified a ack detections. =…”
Section: Source Locationmentioning
confidence: 99%
“…Simply, firewalls are the predecessor of IDS. Even though firewall provides security, it has many shortcomings [12].…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…A DoS assault is among the greatest famous kinds of network intrusion, to degrade the service offered by a particular target to other genuine customers [11], [12], [13]. There are various types of DoS attacks, including blackhole, wormholes, flooding, and gray hole [14], [15], [16], [17]. Each leverages a unique security flaw in the network and wreaking havoc on variables like connection interruption, traffic flooding, system interruption, and access blocking in the wireless link [18].…”
Section: Introductionmentioning
confidence: 99%