2015
DOI: 10.14569/ijarai.2015.040302
|View full text |Cite
|
Sign up to set email alerts
|

Application of Machine Learning Approaches in Intrusion Detection System: A Survey

Abstract: Abstract-Network security is one of the major concerns of the modern era. With the rapid development and massive usage of internet over the past decade, the vulnerabilities of network security have become an important issue. Intrusion detection system is used to identify unauthorized access and unusual attacks over the secured networks. Over the past years, many studies have been conducted on the intrusion detection system. However, in order to understand the current status of implementation of machine learnin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0
5

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 63 publications
(16 citation statements)
references
References 45 publications
0
11
0
5
Order By: Relevance
“…Avishek Khan Hridoy ,Musharrat Rafni ,Faisal Muhammad Shah Dewan Md. Farid [9]given a survey named "Application of Machine Learning Approaches in Intrusion Detection System: A Survey". System security is one of the significant worries of the cutting edge time.…”
Section: Viiiliterature Survey Mouhammadmentioning
confidence: 99%
“…Avishek Khan Hridoy ,Musharrat Rafni ,Faisal Muhammad Shah Dewan Md. Farid [9]given a survey named "Application of Machine Learning Approaches in Intrusion Detection System: A Survey". System security is one of the significant worries of the cutting edge time.…”
Section: Viiiliterature Survey Mouhammadmentioning
confidence: 99%
“…As the focus of network security, network intrusion detection has gained intensive discussion and wide investigations in recent years [14]. Most of them depend on a set of manual rules, which are still unable to identify emerging diverse attacks intelligently.…”
Section: Related Workmentioning
confidence: 99%
“…In anomaly detection, the system builds a profile of that which can be considered as normal or expected usage patterns over a period of time and triggers alarms for anything that deviates from this behavior (Adel, Zeynep & Adnan, 2014) [1]. The misuse detection is used to identify attacks in a form of signature or pattern [13]. As misuse detection uses the known pattern to detect attacks the main disadvantage is that it will fail to identify any unknown attacks to the network or system [13].…”
Section: Introductionmentioning
confidence: 99%
“…The misuse detection is used to identify attacks in a form of signature or pattern [13]. As misuse detection uses the known pattern to detect attacks the main disadvantage is that it will fail to identify any unknown attacks to the network or system [13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation