2023
DOI: 10.11591/eei.v12i4.4708
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning techniques for accurate classification and detection of intrusions in computer network

Abstract: An incursion into the computer network or system in issue occurs whenever there is an attempt made to circumvent the defences that are in place. Training and examination are the two basic components that make up the intrusion detection system (IDS) and each one may be analysed separately. During training, a number of distinct models are built, each of which is able to distinguish between normal and abnormal behaviours that are included within the dataset. This article proposes a combination of ant colony optim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
(11 reference statements)
0
2
0
Order By: Relevance
“…After training, an IDS can use the knowledge it has acquired to predict unauthorized activity more accurately than an IDS that does not use machine learning, using machine learning in IDS can also help reduce the number of false positives that occur, which are cases where an IDS flags legitimate activity as invalid. By leveraging machine learning capabilities to learn more complex patterns [6].…”
Section: Introductionmentioning
confidence: 99%
“…After training, an IDS can use the knowledge it has acquired to predict unauthorized activity more accurately than an IDS that does not use machine learning, using machine learning in IDS can also help reduce the number of false positives that occur, which are cases where an IDS flags legitimate activity as invalid. By leveraging machine learning capabilities to learn more complex patterns [6].…”
Section: Introductionmentioning
confidence: 99%
“…Their system outperformed the other available intrusion attack techniques. Paricherla et al [19] presented a two-dimensionality reduction approach (linear discriminant analysis), to address concerns with extra dimensions in datasets. Ali and Jawhar [20], in their paper titled "Detecting network attacks model based on a convolution neural network", have discussed convolutional neural network (CNN) networks using deep learning convolutional networks.…”
Section: Introductionmentioning
confidence: 99%