2020
DOI: 10.3390/fi12100167
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems

Abstract: The development of robust anomaly-based network detection systems, which are preferred over static signal-based network intrusion, is vital for cybersecurity. The development of a flexible and dynamic security system is required to tackle the new attacks. Current intrusion detection systems (IDSs) suffer to attain both the high detection rate and low false alarm rate. To address this issue, in this paper, we propose an IDS using different machine learning (ML) and deep learning (DL) models. This paper presents… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 54 publications
(18 citation statements)
references
References 13 publications
0
18
0
Order By: Relevance
“…A number of studies have shown that CART is able to provide better performance in general [19][20][21]. This is supported by a study conducted by Thapa et al [22]. In this study, we developed an IDS model that combines machine learning with deep learning.…”
Section: Literature Reviewmentioning
confidence: 70%
“…A number of studies have shown that CART is able to provide better performance in general [19][20][21]. This is supported by a study conducted by Thapa et al [22]. In this study, we developed an IDS model that combines machine learning with deep learning.…”
Section: Literature Reviewmentioning
confidence: 70%
“…e research by Zeng et al proposed a light-weight framework without manual intervention and private information but with the aid of deep learning for encrypted traffic classification and intrusion detection [19]. e model in [20] studied by apa et al was based on classification and regression tree (CART) and CNN and performed well in 10fold cross-validation and independent testing on dataset CIC-IDS2017 [21]. Compared with some other methods, the model brought forward by Javaid employs a self-taught learning technique on NSL-KDD and, as a result, improves the precision and recall rates [22].…”
Section: Related Workmentioning
confidence: 99%
“…The embedded feature selection scheme has been preferred over the filter and wrapper methods [ 56 , 57 , 58 ], and has seen success in fields such as bioinformatics [ 59 , 60 ], and medical research [ 61 , 62 , 63 , 64 ], but remains relatively new in the field of IoT security.…”
Section: Related Workmentioning
confidence: 99%