2021 International Conference on Information Technology (ICIT) 2021
DOI: 10.1109/icit52682.2021.9491770
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(25 citation statements)
references
References 25 publications
0
13
0
Order By: Relevance
“…To reduce network latency (NL) and output, smart contracts (SC) and transaction checking on fog nodes (FN) is recommended. The network architecture will challenge cost reductions in the cloud and optimize cloud and FN instancing performance to boost the efficiency of the hyperledger BC network [ 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 ].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…To reduce network latency (NL) and output, smart contracts (SC) and transaction checking on fog nodes (FN) is recommended. The network architecture will challenge cost reductions in the cloud and optimize cloud and FN instancing performance to boost the efficiency of the hyperledger BC network [ 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 ].…”
Section: Methodsmentioning
confidence: 99%
“…This includes but is not limited to the following ICS cyber attacks: 1. Stuxnet Malware [ 50 , 51 , 52 , 53 , 54 , 55 ]. Multiple attacks on the Ukraine Power Grid in 2015 and 2016 [ 56 , 57 ].…”
Section: Background and Related Studiesmentioning
confidence: 99%
“…Machine Learning classifiers (MLC) algorithms are used for classifying data. Different methods and techniques are used for classification, such as Naïve Bayesian, Support Vector Machines (SVM), Artificial Neural Network (ANN), Decision Tree (C4.5), or (J48) classifier, K-Nearest Neighbor, and Random Forests (RF) [5,8,11,[49][50][51][52][53][54][55]. In this research, J48 and Random Forest classifiers are used.…”
Section: Bio-inspired Optimization Algorithms and Machine Learning Cl...mentioning
confidence: 99%
“…Classifiers that work well to detect a particular attack may not work well for another. According to several previous research publications [9]- [11], there are still certain drawbacks, no matter the pre-processing or feature selection methods used alongside the classifiers. The ML architecture for IDS continuously grows into increasingly complex classifiers to increase its efficacy.…”
Section: Introductionmentioning
confidence: 99%