2021
DOI: 10.11591/ijeecs.v24.i1.pp590-599
|View full text |Cite
|
Sign up to set email alerts
|

Optimized machine learning algorithm for intrusion detection

Abstract: Intrusion detection is mainly achieved by using optimization algorithms. The need for optimization algorithms for intrusion detection is necessitated by the increasing number of features in audit data, as well as the performance failure of the human-based smart intrusion detection system (IDS) in terms of their prolonged training time and classification accuracy. This article presents an improved intrusion detection technique for binary classification. The proposal is a combination of different optimizers, inc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…The sensitivity measure represents the percentage of satisfied students, while the specificity measure (true negative rate) indicates the percentage of unsatisfied students. Accuracy is the proportion of the total number of correct predictions [37]. (1)…”
Section: Discussionmentioning
confidence: 99%
“…The sensitivity measure represents the percentage of satisfied students, while the specificity measure (true negative rate) indicates the percentage of unsatisfied students. Accuracy is the proportion of the total number of correct predictions [37]. (1)…”
Section: Discussionmentioning
confidence: 99%
“…The Kernel Approximation Algorithm The support-vector machine is the most well-known member of the kernel machine class of pattern analysis tools, and it is also the simplest to understand and implement (SVM). The primary goal of pattern analysis is to uncover and study various types of associations (for example, clusters, rankings, PC, correlations, and classifications) in datasets, which is accomplished via the use of statistical techniques [24]- [26]. Numerous techniques that deal with these problems need the explicit conversion of raw input into feature vector representations using a feature map that is provided by the user.…”
Section: Classifying Algorithm and Performance Evaluatmentioning
confidence: 99%
“…Many organizations employ preventive measures to secure their networks and data from internal and external threats with the help of digital technologies. Special considerations are taken on the interactions and the activities performed among the inter-network entities [2]- [5].…”
Section: Introductionmentioning
confidence: 99%