A Survey of Novel Framework of Anomaly-Based Intrusion Detection System in Computer Networks Using Ensemble Feature Integration with Deep Learning Techniques

被引:0
|
作者
Srinivas, Akkepalli [1 ]
Sagar, K. [2 ]
机构
[1] Osmania Univ, Hyderabad 500007, India
[2] JNTUH, Sreyas Inst Engn & Technol, Hyderabad 68, India
关键词
SIDS; AIDS; NIDS;
D O I
10.1145/3651671.3651673
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's internet is made up of nearly half a million different networks. In any network connection, identifying the attacks by their types is a difficult task as different attacks may have various connections, and their number may vary from a few to hundreds of network connections. To solve this problem, IDS-based on machine learning (ML) has been developed to monitor and analyze data packets to detect abnormal behaviors and new attacks. Security in cyberspace is currently receiving more and more attention. Making efficient defenses against many sorts of network attacks, as well as making sure that network equipment is safe and information is secure, has grown to be a major issue. Network intrusion detection systems (NIDSs) are critical components of the architecture for network security protection because they detect harmful attack behaviors by examining the network traffic of key nodes in a network [1, 2]. Intrusion detection systems (IDSs) can be classified as signature-based, and anomaly-based methods [3]. Signature-based IDS (SIDS), often referred to as Rule-based or Misuse IDS, perform ongoing network traffic monitoring and look for sequences or patterns of incoming network data that resemble an attack signature. By keeping error rates low, they are able to identify potential invasions with high accuracy rates. One of the weaknesses of these systems is the demand for an updated database that contains the attack signatures. Anomaly-based intrusion detection systems (AIDS), also known as behavior-based detection, examine the typical behavior of networks by keeping an eye on network traffic for signs of anomalous activity. AIDS can be taught using anomaly detection algorithms or self-taught using self-learning algorithms, allowing them to recognize new kinds of intrusions. Anomaly-based approach distinguishes itself significantly from the signature-based approach when it comes to recognizing new attacks. Essence to develop an efficient NIDS The majority of the most recent IDSs rely on machine learning and deep learning techniques [4-6].
引用
收藏
页码:200 / 205
页数:6
相关论文
共 50 条
  • [21] Intrusion Detection System with an Ensemble Learning and Feature Selection Framework for IoT Networks
    Rohini, G.
    Gnana Kousalya, C.
    Bino, J.
    IETE JOURNAL OF RESEARCH, 2023, 69 (12) : 8859 - 8875
  • [22] Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
    Aldweesh, Arwa
    Derhab, Abdelouahid
    Emam, Ahmed Z.
    KNOWLEDGE-BASED SYSTEMS, 2020, 189 (189)
  • [23] A Deep Learning Approach for Anomaly-Based Network Intrusion Detection Systems: A Survey and an Objective Comparison
    Kumar, Shailender
    Jha, Namrata
    Sachdeva, Nikhil
    MACHINE LEARNING AND BIG DATA ANALYTICS (PROCEEDINGS OF INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND BIG DATA ANALYTICS (ICMLBDA) 2021), 2022, 256 : 227 - 235
  • [24] Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
    Eljialy, A. E. M.
    Uddin, Mohammed Yousuf
    Ahmad, Sultan
    TSINGHUA SCIENCE AND TECHNOLOGY, 2024, 29 (04): : 948 - 958
  • [25] Design and performance analysis of various feature selection methods for anomaly-based techniques in intrusion detection system
    Pandey, Sushant Kumar
    SECURITY AND PRIVACY, 2019, 2 (01)
  • [26] An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks
    Zachos, Georgios
    Essop, Ismael
    Mantas, Georgios
    Porfyrakis, Kyriakos
    Ribeiro, Jose C.
    Rodriguez, Jonathan
    ELECTRONICS, 2021, 10 (21)
  • [27] An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection
    Kannari, Phanindra Reddy
    Chowdary, Noorullah Shariff
    Biradar, Rajkumar Laxmikanth
    THEORETICAL COMPUTER SCIENCE, 2022, 931 : 56 - 64
  • [28] An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection
    Kannari, Phanindra Reddy
    Chowdary, Noorullah Shariff
    Laxmikanth Biradar, Rajkumar
    Theoretical Computer Science, 2022, 931 : 56 - 64
  • [29] Anomaly-based intrusion detection system in IoT using kernel extreme learning machine
    Bacha S.
    Aljuhani A.
    Abdellafou K.B.
    Taouali O.
    Liouane N.
    Alazab M.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (1) : 231 - 242
  • [30] Anomaly-based intrusion detection system in IoT using kernel extreme learning machine
    Bacha, Sawssen
    Aljuhani, Ahamed
    Abdellafou, Khawla Ben
    Taouali, Okba
    Liouane, Noureddine
    Alazab, Mamoun
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) : 231 - 242