A Survey of Novel Framework of Anomaly-Based Intrusion Detection System in Computer Networks Using Ensemble Feature Integration with Deep Learning Techniques

被引:0
|
作者
Srinivas, Akkepalli [1 ]
Sagar, K. [2 ]
机构
[1] Osmania Univ, Hyderabad 500007, India
[2] JNTUH, Sreyas Inst Engn & Technol, Hyderabad 68, India
关键词
SIDS; AIDS; NIDS;
D O I
10.1145/3651671.3651673
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's internet is made up of nearly half a million different networks. In any network connection, identifying the attacks by their types is a difficult task as different attacks may have various connections, and their number may vary from a few to hundreds of network connections. To solve this problem, IDS-based on machine learning (ML) has been developed to monitor and analyze data packets to detect abnormal behaviors and new attacks. Security in cyberspace is currently receiving more and more attention. Making efficient defenses against many sorts of network attacks, as well as making sure that network equipment is safe and information is secure, has grown to be a major issue. Network intrusion detection systems (NIDSs) are critical components of the architecture for network security protection because they detect harmful attack behaviors by examining the network traffic of key nodes in a network [1, 2]. Intrusion detection systems (IDSs) can be classified as signature-based, and anomaly-based methods [3]. Signature-based IDS (SIDS), often referred to as Rule-based or Misuse IDS, perform ongoing network traffic monitoring and look for sequences or patterns of incoming network data that resemble an attack signature. By keeping error rates low, they are able to identify potential invasions with high accuracy rates. One of the weaknesses of these systems is the demand for an updated database that contains the attack signatures. Anomaly-based intrusion detection systems (AIDS), also known as behavior-based detection, examine the typical behavior of networks by keeping an eye on network traffic for signs of anomalous activity. AIDS can be taught using anomaly detection algorithms or self-taught using self-learning algorithms, allowing them to recognize new kinds of intrusions. Anomaly-based approach distinguishes itself significantly from the signature-based approach when it comes to recognizing new attacks. Essence to develop an efficient NIDS The majority of the most recent IDSs rely on machine learning and deep learning techniques [4-6].
引用
收藏
页码:200 / 205
页数:6
相关论文
共 50 条
  • [41] An Anomaly-based Intrusion Detection System Using Butterfly Optimization Algorithm
    Mahboob, Amir Soltany
    Moghaddam, Mohammad Reza Ostadi
    2020 6TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS), 2020,
  • [42] Undermining an anomaly-based intrusion detection system using common exploits
    Tan, KMC
    Killourhy, KS
    Maxion, RA
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 54 - 73
  • [43] Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks
    Zachos, Georgios
    Mantas, Georgios
    Essop, Ismael
    Porfyrakis, Kyriakos
    Ribeiro, Jose C.
    Rodriguez, Jonathan
    2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 179 - 183
  • [44] A novel deep learning-based framework with particle swarm optimisation for intrusion detection in computer networks
    Yilmaz, Abdullah Asim
    PLOS ONE, 2025, 20 (02):
  • [45] Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic
    Abdulhammed, Razan
    Faezipour, Miad
    Abuzneid, Abdelshakour
    AbuMallouh, Arafat
    IEEE SENSORS LETTERS, 2019, 3 (01)
  • [46] Feature reduction scheme for anomaly-based intrusion detection in wireless networks: Building of hybrid model
    Gavel, Shashank
    Singh, Jyotsana
    Shukla, Namrata
    Raghuvanshi, Ajay Singh
    Tiwari, Sudarshan
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (12):
  • [47] A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks
    Naveed, Muhammad
    Arif, Fahim
    Usman, Syed Muhammad
    Anwar, Aamir
    Hadjouni, Myriam
    Elmannai, Hela
    Hussain, Saddam
    Ullah, Syed Sajid
    Umar, Fazlullah
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [48] Flow based anomaly intrusion detection system using ensemble classifier with Feature Impact Scale
    V. Jyothsna
    K. Munivara Prasad
    K. Rajiv
    G. Ramesh Chandra
    Cluster Computing, 2021, 24 : 2461 - 2478
  • [49] Flow based anomaly intrusion detection system using ensemble classifier with Feature Impact Scale
    Jyothsna, V.
    Prasad, K. Munivara
    Rajiv, K.
    Chandra, G. Ramesh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 2461 - 2478
  • [50] Accuracy improvement of anomaly-based intrusion detection system using Taguchi method
    Konno, T
    Tateoka, M
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 90 - 93