2021
DOI: 10.3390/s21237835
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Network Intrusion Detection System

Abstract: A reasonably good network intrusion detection system generally requires a high detection rate and a low false alarm rate in order to predict anomalies more accurately. Older datasets cannot capture the schema of a set of modern attacks; therefore, modelling based on these datasets lacked sufficient generalizability. This paper operates on the UNSW-NB15 Dataset, which is currently one of the best representatives of modern attacks and suggests various models. We discuss various models and conclude our discussion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 23 publications
(25 reference statements)
0
3
0
Order By: Relevance
“…In Figure 9, a brief comparison analysis of the GJODL-CADC technique with existing techniques was made using the UN-SWNB15 dataset [29][30][31][32]. The results described that the ANN and SVM models exhibit poor performance.…”
Section: Resultsmentioning
confidence: 99%
“…In Figure 9, a brief comparison analysis of the GJODL-CADC technique with existing techniques was made using the UN-SWNB15 dataset [29][30][31][32]. The results described that the ANN and SVM models exhibit poor performance.…”
Section: Resultsmentioning
confidence: 99%
“…Security Information and Event Management systems have become essential for Cyber SOCs, playing a critical role in safeguarding the IT infrastructure by enhancing cyber threat detection and response, thereby improving operational efficiency and mitigating security incident impacts [50]. Efficient allocation of centralized NIDS sensors through an SIEM system is crucial for optimizing detection coverage and operational efficiency, considering the organization's specific security needs [51]. This strategic approach allows for cohesive management and comprehensive security data analysis, leading to a faster and more effective response to security incidents [52].…”
Section: Cybersecurity Operations Centersmentioning
confidence: 99%
“…The DDoS dataset is used for applying the hybrid model. The research [17] was carried out using a novel Arithmetic Optimization Algorithm (AOEDBC-DL) based on the binary LSTM and deep learning approach [46]. The accuracy is 98.16 % for the WSN-DS dataset.…”
Section: Type Style and Fontsmentioning
confidence: 99%