2016
DOI: 10.9734/bjast/2016/23668
|View full text |Cite
|
Sign up to set email alerts
|

IDS Using Machine Learning - Current State of Art and Future Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4
1

Relationship

4
6

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 0 publications
0
14
0
1
Order By: Relevance
“…Their experiments showed that evasions caused an exacerbation of the True Positive Rate(TPR) ranging from 7.8% to 66.8%, while the dataset augmentation increased the TPR by 4.21%-73.3%. However, all these proposed approaches are based on the anomaly-detection NIDS whose actual deployment is rarely seen due to its high false positive rate and low accuracy [27]. Du and Yang [28] developed probabilistic graphical models to analyse the impact of removal, insertion, and alteration evasion actions on performance of an NIDS.…”
Section: Related Workmentioning
confidence: 99%
“…Their experiments showed that evasions caused an exacerbation of the True Positive Rate(TPR) ranging from 7.8% to 66.8%, while the dataset augmentation increased the TPR by 4.21%-73.3%. However, all these proposed approaches are based on the anomaly-detection NIDS whose actual deployment is rarely seen due to its high false positive rate and low accuracy [27]. Du and Yang [28] developed probabilistic graphical models to analyse the impact of removal, insertion, and alteration evasion actions on performance of an NIDS.…”
Section: Related Workmentioning
confidence: 99%
“…A discussion about the Network Intrusion Detection, techniques and open issues is given in [6]. A detailed survey of the research efforts spared for intrusion detection over last few decades is given in our work [7], with the plenty of works listed in the paper the authors conclude that Hybrid Machine Learning techniques have been used vastly. Authors in [8] proposed the hybrid Audit Data Analysis and Mining, where the anomaly detection is followed by misuse detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A complete survey of intrusion detection attempts using machine learning is given in our work [10], from the paper it is concluded that SVM is one of the most popular techniques for designing an intrusion detection system. Authors in [11] have attempted to compare the SVM with neural networks, even thought the accuracy of the two is more or less the same , time taken to build up the model is less is less in SVM.…”
Section: Literature Surveymentioning
confidence: 99%