Computer and Network Security 2020
DOI: 10.5772/intechopen.82287
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-Based Intrusion Detection System

Abstract: Anomaly-based network intrusion detection plays a vital role in protecting networks against malicious activities. In recent years, data mining techniques have gained importance in addressing security issues in network. Intrusion detection systems (IDS) aim to identify intrusions with a low false alarm rate and a high detection rate. Although classification-based data mining techniques are popular, they are not effective to detect unknown attacks. Unsupervised learning methods have been given a closer look for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…Many techniques have been used for developing NIDS including computing based, data mining based, statistical based, machine learning, cognitive based or knowledge based, user intention identification, etc. [24] Machine learning techniques are one of the most used approaches due to their ability to learn patterns from data and differentiate between abnormal and normal traffic. Many classical machine learning techniques have been applied in IDS [29].…”
Section: Related Work In Ids Developmentmentioning
confidence: 99%
“…Many techniques have been used for developing NIDS including computing based, data mining based, statistical based, machine learning, cognitive based or knowledge based, user intention identification, etc. [24] Machine learning techniques are one of the most used approaches due to their ability to learn patterns from data and differentiate between abnormal and normal traffic. Many classical machine learning techniques have been applied in IDS [29].…”
Section: Related Work In Ids Developmentmentioning
confidence: 99%
“…In the second phase, which is the testing phase, previously unseen intrusions are learned using a new dataset. AIDS can be divided into statistics-based, knowledge-based, and machine-learning methods [28].…”
Section: Page 302mentioning
confidence: 99%
“…Moreover, countless types of cyber-attacks have evolved dramatically since the inception of the Internet and the swift growth of ground-breaking technologies. For example, social engineering or phishing ( Kushwaha, Buckchash & Raman, 2017 ), zero-day attack ( Jyothsna & Prasad, 2019 ), malware attack ( McIntosh et al, 2019 ), denial of service (DoS) ( Verma & Ranga, 2020 ), unauthorized access of confidential and valuable resources ( Saleh, Talaat & Labib, 2019 ). Additionally, according to the authors of Papastergiou, Mouratidis & Kalogeraki (2020) , a nation’s competitive edge in the global market and national security is currently driven by harnessing these efficient, productive, and highly secure leading-edge technologies with intelligent and dynamic means of timely detection and prevention of cyberattacks.…”
Section: Introductionmentioning
confidence: 99%
“…Otherwise, the anomaly detection system triggers an alert of anomaly ( Kagara & Md Siraj, 2020 ). It is essential to note that the main design idea of the anomaly detection method is to outline and represent the usual and expected standard behavior profile through observing activities and then defining anomalous activities by their degree of deviation from the expected behavior profile using statistical-based, knowledge-based, and machine learning-based methods ( Jyothsna & Prasad, 2019 ; Khraisat et al, 2020 ). The acceptable network behavior can be learned using the predefined network conditions, more like blocklists or allowlists that determine the network behavior outside a predefined acceptable range.…”
Section: Introductionmentioning
confidence: 99%