Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree

被引:31
作者
Azam, Zahedi [1 ]
Islam, Md. Motaharul [1 ]
Huda, Mohammad Nurul [1 ]
机构
[1] United Int Univ, Dept Comp Sci & Engn, Dhaka 1212, Bangladesh
关键词
Intrusion detection system; machine learning; inductive learning; DDoS attacks; decision tree; supervised and unsupervised learning; FEATURE-SELECTION; ANOMALY DETECTION; SPARSE AUTOENCODER; NEURAL-NETWORKS; DATA ANALYTICS; ENSEMBLE; IOT; CLASSIFICATION; SVM; OPTIMIZATION;
D O I
10.1109/ACCESS.2023.3296444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a comprehensive review of intrusion detection techniques, and commonly used datasets for evaluation. It discusses evasion techniques employed by attackers and the challenges in combating them to enhance network security. Researchers strive to improve IDS by accurately detecting intruders, reducing false positives, and identifying new threats. Machine learning (ML) and deep learning (DL) techniques are adopted in IDS systems, showing potential in efficiently detecting intruders across networks. The paper explores the latest trends and advancements in ML and DL-based network intrusion detection systems (NIDS), including methodology, evaluation metrics, and dataset selection. It emphasizes research obstacles and proposes a future research model to address weaknesses in the methodologies. The decision tree, known for its speed and user-friendliness, is proposed as a model for detecting result anomalies, combining findings from a comparative survey. This research aims to provide insights into building an effective decision tree-based detection framework.
引用
收藏
页码:80348 / 80391
页数:44
相关论文
共 272 条
  • [1] A New Ensemble-Based Intrusion Detection System for Internet of Things
    Abbas, Adeel
    Khan, Muazzam A.
    Latif, Shahid
    Ajaz, Maria
    Shah, Awais Aziz
    Ahmad, Jawad
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) : 1805 - 1819
  • [2] A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications
    Abdalzaher, Mohamed S.
    Muta, Osamu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11): : 11250 - 11261
  • [3] Employing Game Theory and TDMA Protocol to Enhance Security and Manage Power Consumption in WSNs-Based Cognitive Radio
    Abdalzaher, Mohamed S.
    Muta, Osamu
    [J]. IEEE ACCESS, 2019, 7 : 132923 - 132936
  • [4] Abdalzaher MS, 2017, IEEE SYMP COMP COMMU, P1257, DOI 10.1109/ISCC.2017.8024697
  • [5] Abdalzaher MS, 2017, IEEE SYMP COMP COMMU, P552, DOI 10.1109/ISCC.2017.8024586
  • [6] A review of uncertainty quantification in deep learning: Techniques, applications and challenges
    Abdar, Moloud
    Pourpanah, Farhad
    Hussain, Sadiq
    Rezazadegan, Dana
    Liu, Li
    Ghavamzadeh, Mohammad
    Fieguth, Paul
    Cao, Xiaochun
    Khosravi, Abbas
    Acharya, U. Rajendra
    Makarenkov, Vladimir
    Nahavandi, Saeid
    [J]. INFORMATION FUSION, 2021, 76 : 243 - 297
  • [7] Principal component analysis
    Abdi, Herve
    Williams, Lynne J.
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (04): : 433 - 459
  • [8] A novel SVM-kNN-PSO ensemble method for intrusion detection system
    Aburomman, Abdulla Amin
    Reaz, Mamun Bin Ibne
    [J]. APPLIED SOFT COMPUTING, 2016, 38 : 360 - 372
  • [9] Aggarwal A., 2021, INT J INF MANAG DATA, V1, P1, DOI DOI 10.1016/J.JJIMEI.2020.100004
  • [10] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713