2021
DOI: 10.3390/math9060690
|View full text |Cite
|
Sign up to set email alerts
|

Performance Assessment of Supervised Classifiers for Designing Intrusion Detection Systems: A Comprehensive Review and Recommendations for Future Research

Abstract: Supervised learning and pattern recognition is a crucial area of research in information retrieval, knowledge engineering, image processing, medical imaging, and intrusion detection. Numerous algorithms have been designed to address such complex application domains. Despite an enormous array of supervised classifiers, researchers are yet to recognize a robust classification mechanism that accurately and quickly classifies the target dataset, especially in the field of intrusion detection systems (IDSs). Most o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 82 publications
(44 citation statements)
references
References 93 publications
0
40
0
Order By: Relevance
“…Various approaches are mechanized in the secured communication of the healthcare-related data among the devices, Virtual (private VPN), that shields the data transferred over the channels by anonymizing the metadata associated with the information exchanged among the nodes through anonymous tunneling. Many standardized approaches are using the symmetric key and asymmetric vital cryptosystems, and a majority of those algorithms would replace the plain text into ciphertext data that is not understandable that is done by performing substitution and arithmetic operations over the plain text, and different mechanisms are used in identifying such anomalous activities [26,27].…”
Section: Existing Studies On the Security Mechanismmentioning
confidence: 99%
“…Various approaches are mechanized in the secured communication of the healthcare-related data among the devices, Virtual (private VPN), that shields the data transferred over the channels by anonymizing the metadata associated with the information exchanged among the nodes through anonymous tunneling. Many standardized approaches are using the symmetric key and asymmetric vital cryptosystems, and a majority of those algorithms would replace the plain text into ciphertext data that is not understandable that is done by performing substitution and arithmetic operations over the plain text, and different mechanisms are used in identifying such anomalous activities [26,27].…”
Section: Existing Studies On the Security Mechanismmentioning
confidence: 99%
“…The authors used the generation interval, defined as the time needed for an infected person to infect another person and for reproduction rate estimation. The works by Zhang et al ( 35 ) and by Srinivasu et al ( 36 ), Panigrahi et al ( 37 , 38 ), Tamang ( 39 ), Chowdhary et al ( 40 ), and Gaur et al ( 41 ) demonstrated the efficacy of machine learning algorithms in various fields.…”
Section: Related Workmentioning
confidence: 99%
“…However, decisionmaking responses suffer from various problems. To deal with these problems, advanced data-driven and machine learning approaches have been regularly developed in recent researches [7][8][9][10][11][12][13]. Furthermore, many systems cannot handle high dimensional datasets and select significant features to compute a general weight for them based on their significance due to the lack of a smart framework [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, most of the existing literature considered the accuracy and false-positive rate for assessing the performance of classification algorithms. The absence of other performance measures, such as model build time, misclassification rate, and precision, should be considered the major limitation for classifier performance evaluation [10].…”
Section: Introductionmentioning
confidence: 99%