2021
DOI: 10.3390/sym13040557
|View full text |Cite
|
Sign up to set email alerts
|

Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems

Abstract: This paper presents a novel approach for an Intrusion Detection System (IDS) based on one kind of asymmetric optimization which use any three already well-known IDS algorithms and Triple Modular Redundancy (TMR) algorithm together. Namely, a variable threshold which indicates an attack on an observed and protected network is determined by using all three values obtained with three known IDS algorithms i.e., on previously recorded data by making a decision by majority. For these algorithms authors used algorith… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…To study systems with triple modular reservation [27][28][29], the method of calculating the probability of trouble-free functioning of the system with triple modular reservation was used.…”
Section: The Study Materials and Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…To study systems with triple modular reservation [27][28][29], the method of calculating the probability of trouble-free functioning of the system with triple modular reservation was used.…”
Section: The Study Materials and Methodsmentioning
confidence: 99%
“…A common expression for determining the probability of a system trouble-free operation with a triple modular reservation when k = 3 [27][28][29]:…”
Section: The Study Materials and Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we evaluate the accuracy of the algorithm by comparing the results of algorithms Cet, HFDD, and DisTFD with those of the TANE [ 25 ] algorithm, respectively, using the method in the literature [ 45 ].…”
Section: Methodsmentioning
confidence: 99%
“…For example, the paper [6] presented the Triple Modular Redundancy (TMR) method, as one of the machine learning (ML) ensemble methods, which optimizes the efficiency in determining the threshold when detecting attacks on the network. In this ensemble, there are the attack suggestion algorithm, the k-nearest neighbors algorithm, the cumulative sum algorithm, and the exponentially weighted moving average algorithm in combination with TMR [7][8][9], while the role of voting is played by informational TMR in the optimization process.…”
Section: Introductionmentioning
confidence: 99%