2022
DOI: 10.1109/access.2022.3171660
|View full text |Cite
|
Sign up to set email alerts
|

An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Naïve Bayes (LNB) Classification Approach for Network Intrusion Detection System

Abstract: Intrusion detection and classification have gained significant attention recently due to the increased utilization of networks. For this purpose, there are different types of Network Intrusion Detection System (NIDS) approaches developed in the conventional works, which mainly focus on identifying the intrusions from the datasets with the help of classification techniques. Still, it is limited by the significant problems of inefficiency in handling large dimensional datasets, high computational complexity, fal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(29 citation statements)
references
References 59 publications
0
29
0
Order By: Relevance
“…Another point is that the usage of artificial neural networks seems promising, since even with a simple ANN the results were similar to the other algorithms tested. Compared with the results presented in [ 9 ], we obtained better results with the testing dataset for classes that were better represented in terms of the number of samples in the dataset. However, the authors of [ 9 ] obtained better performance using PPGO, a bio-inspired optimization technique, for the U2R class, which had few samples in the dataset.…”
Section: Methodsmentioning
confidence: 56%
See 1 more Smart Citation
“…Another point is that the usage of artificial neural networks seems promising, since even with a simple ANN the results were similar to the other algorithms tested. Compared with the results presented in [ 9 ], we obtained better results with the testing dataset for classes that were better represented in terms of the number of samples in the dataset. However, the authors of [ 9 ] obtained better performance using PPGO, a bio-inspired optimization technique, for the U2R class, which had few samples in the dataset.…”
Section: Methodsmentioning
confidence: 56%
“…For the purposes of this paper, we used the NSL-KDD dataset, which is a refined version of its predecessor KDD’99, a well-known benchmark in the research on intrusion detection techniques [ 6 , 9 , 10 , 11 , 12 , 13 ]. This labeled dataset is split into training and testing files and can be downloaded from [ 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…The research on the IDS system in this paper is to distinguish whether it is a malicious attack, or to distinguish the specific form of the attack. Different from the CNN algorithm proposed in this paper, the mainstream algorithms include decision tree [29], Naive Bayes [28], Logist regression [27], ensemble algorithm [30] and so on.…”
Section: Resultsmentioning
confidence: 99%
“…An intrusion detection model based on network detection data learning mechanism is proposed. In 2022, Shitharth et al [28] proposed an innovative cluster-based classification method to accurately detect intrusions from different types of IDS datasets. First, data preprocessing is performed to normalize the dataset to eliminate irrelevant attributes and organize features.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, machine learning techniques, specifically deep learning that does not generally require prior experience or dependence on previous expert classifications may be particularly important as an implementation of cyber security AI approaches. The study [71][72][73][74][75][76][77] analysis to the effectiveness for cyber security purposes of machine learning approaches. This research included the implementation of methods of machine learning to identify intrusions, spam and malware.…”
Section: Machine Learning Applications In Cyber Securitymentioning
confidence: 99%