2015
DOI: 10.14257/ijsia.2015.9.9.20
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review

Abstract: In the recent work environment, any firm or organization can't guarantee the achievement of its strategic goals, that is, its success without utilizing IT well, so the IT became the object of main attention, and the reliance on the IT gets more intensified in all business fields. Therefore, each firm and public institute take enormous efforts for setting their internal audit systems appropriate for the recent business environment. Especially as the Public Audit Act began to take in effect from 2010, its raised… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…By using cyber-espionage, phishing emails, and other techniques, the attacker takes advantage of these vulnerabilities to use malicious codes or applications. Once the initial breach is done, the attacker maintains control over that [16]. On gain a firm footing, the attacker installs a backdoor or downloads malware to the infected system.…”
Section: Theoretical Study Regarding Cyber Security and Artificial In...mentioning
confidence: 99%
See 1 more Smart Citation
“…By using cyber-espionage, phishing emails, and other techniques, the attacker takes advantage of these vulnerabilities to use malicious codes or applications. Once the initial breach is done, the attacker maintains control over that [16]. On gain a firm footing, the attacker installs a backdoor or downloads malware to the infected system.…”
Section: Theoretical Study Regarding Cyber Security and Artificial In...mentioning
confidence: 99%
“…Examples include buffer overflow, load modules, perl, rootkits, ps, sqlattacks, and x terms. d) Probe: A probe is a program or other device that is put at a crucial junction in a network in order to track or gather information about network activity [16]. For instance, nmap, portsweep, Satan, and ipsweep…”
Section: Theoretical Study Regarding Cyber Security and Artificial In...mentioning
confidence: 99%
“…The training dataset of KDD Cup-99 comprises approximately 4,900,000 individual link vectors, each with 41 features and labeled as regular or as an attack, with precisely one particular form of attack [36]. The data collection includes 24 attack forms (connections) falling into one of the four main categories: denial of service (DOS), sample/scanning, root user (U2R), and user remote (R2L).…”
Section: Data Setsmentioning
confidence: 99%
“…Support Vector Machine (SVM) is used, as a method in a study, to evaluate IDS [27]. Among various approaches of IDS, SVM acts as a classifier with false alarm and detection rate as a measure of performance.…”
Section: E Machine Learning (Ml) and Deep Learning (Dl) Based Detectionmentioning
confidence: 99%