2022
DOI: 10.1155/2022/9663052
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Review on Hybrid Intrusion Detection System

Abstract: As computer networks keep growing at a high rate, achieving confidentiality, integrity, and availability of the information system is essential. Intrusion detection systems (IDSs) have been widely used to monitor and secure networks. The two major limitations facing existing intrusion detection systems are high rates of false-positive alerts and low detection rates on zero-day attacks. To overcome these problems, we need intrusion detection techniques that can learn and effectively detect intrusions. Hybrid me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 124 publications
0
5
0
Order By: Relevance
“…10. The creators [16] fostered an interruption location framework by joining firefly and Hopfield brain organization HNN calculations. The analysts utilized Firefly calculation to identify refusal-of-rest assaults through hub grouping and verification.…”
Section: Hybrid-based Methodologymentioning
confidence: 99%
“…10. The creators [16] fostered an interruption location framework by joining firefly and Hopfield brain organization HNN calculations. The analysts utilized Firefly calculation to identify refusal-of-rest assaults through hub grouping and verification.…”
Section: Hybrid-based Methodologymentioning
confidence: 99%
“…Extensive experiments on four intrusion datasets were conducted to demonstrate the effectiveness and robustness of the RUIDS. Yang et al [5] proposed IDS based on an improved vision transformer, demonstrating superior results on the NSL-KDD public intrusion detection via simulation experiments.…”
Section: B Algorithm-level Mitigation Effortsmentioning
confidence: 99%
“…1 presents a schematic diagram of our proposed model. [5], NSL-KDD [53] and KDD-CUP99 [54] are the most widely used datasets in IDS research (ca. 2012-2022).…”
Section: Proposed Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Among these security measures, the Intrusion Detection System is extensively explored in the literature as a technique to enhance security for individual users and information systems. Intrusion, defined as compromising the integrity, availability, and confidentiality of information on a computer network through unauthorized access, has been a subject of significant attention in the field (Maseno et al, 2022). As per Ali et al (2018), an intrusion detection system serves as the primary security technique deployed to protect IT infrastructure against intentional and unintentional attacks.…”
Section: Introductionmentioning
confidence: 99%