2020
DOI: 10.20944/preprints202004.0481.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

IntruDTree: A Machine Learning-Based Cyber Security Intrusion Detection Model

Abstract: Cyber security has recently received enormous attention in today’s security concerns, due to the popularity of the Internet-of-Things (IoT), the tremendous growth of computer networks, and the huge number of relevant applications. Thus, detecting various cyber-attacks or anomalies in a network and building an effective intrusion detection system that performs an essential role in today’s security is becoming more important. Artificial intelligence, particularly machine learning techniques, … Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
75
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

4
4

Authors

Journals

citations
Cited by 69 publications
(78 citation statements)
references
References 45 publications
0
75
0
3
Order By: Relevance
“…Signature-based IDS requires specific patterns of malicious samples to perform detection, which raises an issue against never seen threats. On the other hand, anomaly-based IDS profile the behaviour of network traffic in order to detect deviations when no traffic categorization can be performed [ 30 ]. Different anomaly-based IDS deployments leverage data-driven learning approaches in order to detect botnets accurately, both when dealing with existing specimens and with new variants as well.…”
Section: State Of the Artmentioning
confidence: 99%
“…Signature-based IDS requires specific patterns of malicious samples to perform detection, which raises an issue against never seen threats. On the other hand, anomaly-based IDS profile the behaviour of network traffic in order to detect deviations when no traffic categorization can be performed [ 30 ]. Different anomaly-based IDS deployments leverage data-driven learning approaches in order to detect botnets accurately, both when dealing with existing specimens and with new variants as well.…”
Section: State Of the Artmentioning
confidence: 99%
“…Thus the challenge is to effectively select the relevant and important features or extracting new features that are known as feature optimization. In the area of AI, particularly data science and machine learning, feature optimization problem is considered as an important pre-processing step that helps to build an effective and simplified model and consequently improves the performance of the learning algorithms by removing the redundant and irrelevant features [111]. Therefore, feature optimization could be a significant research issue in the area of mobile data science and intelligent applications.…”
Section: Research Issues and Future Directionsmentioning
confidence: 99%
“…Among the traditional machine learning classification approaches, a tree-based, particularly, a decision tree based context-aware model is more effective to analyze user behavior in the domain of smartphone data analytics [7]. A number of researchers use decision tree classification technique in their study for different purposes [19][20][21][22][23]. For instance, Hong et al [20], Lee et al [21] propose context-aware model for providing personalized services utilizing context history.…”
Section: Background and Related Workmentioning
confidence: 99%
“…A decision tree based robust user behavior model utilizing contextual smartphone data has been presented in [11]. In addition to smartphone usage, decision tree based model can also be used in the domain of IoT or cybersecurity analytics [23]. Several decision tree learning approaches such as ID3 decision tree [24], C4.5 decision tree [25], behavioral decision tree BehavDT [6] exist with the capability of constructing contextual decision trees and building context-aware predictive models.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation