2020
DOI: 10.1109/access.2020.2994931
|View full text |Cite
|
Sign up to set email alerts
|

TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection

Abstract: Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. However, high dimensional data present a significant challenge for machine learning techniques. Processing similar features that provide redundant information increases the computational time, which is a critical pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 66 publications
(27 citation statements)
references
References 35 publications
(41 reference statements)
0
22
0
Order By: Relevance
“…The number of k-folds in cross-validation is separated into k equal-sized folds [48]. After applying a training classification algorithm, implementing a model, and getting the output of classification, the last step is a validation to find how effective the model is based on several different metrics in the phase of the testing dataset [49]. Various performance metrics are used to evaluate different supervised learning algorithms, as shown in Table 1 [50].…”
Section: Evaluation Performance Appropriate Metricsmentioning
confidence: 99%
“…The number of k-folds in cross-validation is separated into k equal-sized folds [48]. After applying a training classification algorithm, implementing a model, and getting the output of classification, the last step is a validation to find how effective the model is based on several different metrics in the phase of the testing dataset [49]. Various performance metrics are used to evaluate different supervised learning algorithms, as shown in Table 1 [50].…”
Section: Evaluation Performance Appropriate Metricsmentioning
confidence: 99%
“…The intrusion is the entity tries to enter the organization network with unauthorized access as a malicious node. Intrusion Detection System is the monitoring system of network traffic to identify the intrusions and alert on intrusion detection, if any Intrusion Detections [1] can be employed at host systems as host based intrusion detection systems or at networks connecting computers as a network based intrusion detection systems. There are two types of intrusion detection systems Misuse detection and Anomaly detection system.…”
Section: Intrusion Detection System Problem and Enhancementmentioning
confidence: 99%
“…This system further addresses the security requirements in connection to the communication between cloud services and smart devices. To integrate intrusion detection techniques within cloud, fuzzy neural network (FNN) built genetic algorithm approach is conferred in [8]. This system is able to build up knowledge of fuzzy rules as of dataset to classify invasions in a cloud atmosphere.…”
Section: Several Existing Intrusion Detection Systems Namelymentioning
confidence: 99%