2020
DOI: 10.20944/preprints202012.0315.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Intelligent Cyber-Attack Detection and Classification for Network-based Intrusion Detection Systems

Abstract: With the latest advances in information and communication technologies, greater amounts of sensitive user and corporate information are constantly shared across the network making it susceptible to an attack that can compromise data confidentiality, integrity and availability. Intrusion Detection Systems (IDS) are important security mechanisms that can perform a timely detection of malicious events through the inspection of network traffic or host-based logs. Throughout the years, many machine learning techniq… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…The key purpose of IDS is to detect unwanted traffic in the network that could be a potential attack [ 50 ]. There are two main types of detection techniques [ 51 ]: misuse detection and anomaly detection.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…The key purpose of IDS is to detect unwanted traffic in the network that could be a potential attack [ 50 ]. There are two main types of detection techniques [ 51 ]: misuse detection and anomaly detection.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…Several algorithms such as Random Forest, Multi-layer Perceptron and Long Short-Term Memory were experimented. For a more detailed description of the employed methods readers can be redirected to [22].…”
Section: Machine Learningmentioning
confidence: 99%
“…Different from binary classifiers, recent reviews of the literature [15], [19], [20], [21] identify common multi-class classifiers employed in NIDS using KNN [22], SVM [22], NB [22] [23] [24], DT [24], RF [23] [24] [25], and Artificial Neural Network (ANN) [25] [26] [27]. Although these classifiers are capable of achieving high accuracy labeling known intrusions from training with attack databases, they lack the capability of detecting unknown attacks.…”
Section: Related Workmentioning
confidence: 99%