2021
DOI: 10.30880/jscdm.2021.02.01.004
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Classification Algorithms for Intrusion Detection System: A Review

Abstract: Intrusion detection is one of the most critical network security problems in the technology world. Machine learning techniques are being implemented to improve the Intrusion Detection System (IDS). In order to enhance the performance of IDS, different classification algorithms are applied to detect various types of attacks. Choosing a suitable classification algorithm for building IDS is not an easy task. The best method is to test the performance of the different classification algorithms. This paper aims to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(37 citation statements)
references
References 65 publications
0
26
0
Order By: Relevance
“…In order to calculate theses performance metrics, a confusion matrix is used [24,25], which is presented Table 2. The equations below are used to evaluate the accuracy, recall, precision, and F-measure [26,27], respectively of the proposed IDS:…”
Section: Benchmark Dataset and Evaluation Metricsmentioning
confidence: 99%
“…In order to calculate theses performance metrics, a confusion matrix is used [24,25], which is presented Table 2. The equations below are used to evaluate the accuracy, recall, precision, and F-measure [26,27], respectively of the proposed IDS:…”
Section: Benchmark Dataset and Evaluation Metricsmentioning
confidence: 99%
“…This system detects the organization traffic and alerts the administrator if any suspicious activities occur. One attribute of HIDS is that file systems storing the network analytical are protected from misplacements or changes and then an alert is sent to the administrator [55]. An IoT HIDS that can identify cyberattacks was created by Wang et al [56].…”
Section: Host-based Ids For Iot Systems (Hids)mentioning
confidence: 99%
“…All of the network forensics approaches having been proposed have been evaluated in terms of detection rate (True Positive Rate (TPR)) and false alarms (False Positive Rate (FPR)). Since the dataset used in this paper is highly imbalanced, f-Score measure and accuracy are used for better evaluation [43][44][45]. Table 3 illustrates the confusion matrix while the next four equations present the calculation for TPR, FPR, f-Score, and accuracy, respectively, based on the values from the confusion matrix: (10) Detection Rate (TPR) =…”
Section: Data Examinationmentioning
confidence: 99%