A comparative study of techniques for intrusion detection

被引:30
|
作者
Mukkamala, S [1 ]
Sung, AH [1 ]
机构
[1] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM USA
关键词
intrusion detection; AI techniques; information security;
D O I
10.1109/TAI.2003.1250243
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to increasing incidents of cyber attacks and heightened concerns for cyber terrorism, implementing effective intrusion detection systems (IDSs) is an essential task for protecting cyber security--as well as physical security because of the great dependence on networked computers for the operational control of various infrastructures. Building effective IDSs, unfortunately, has remained an elusive goal owing to the great technical challenges involved; and applied AI techniques are increasingly being utilized in attempts to overcome the difficulties. This paper presents a comparative study of using support vector machines (SVMs), artificial neural networks (ANNs), multivariate adaptive regression splines (MARS) and linear genetic programs (LGPs) for intrusion detection. We investigate and compare the performance of IDSs based on the mentioned techniques, with respect to a well-known set of intrusion evaluation data gathered by Lincoln Labs. Through a variety of experiments and analysis, it is found that, with appropriately chosen population size, program size, crossover rate and mutation rate, LGPs outperform other techniques in terms of detection accuracy at the expense of time. SVMs outperform MARS and ANNs in three critical aspects of intrusion detection: accuracy, training time, and testing time.
引用
收藏
页码:570 / 577
页数:8
相关论文
共 50 条
  • [31] A comparative study of cyber security intrusion detection in healthcare systems
    Zhang, Yan
    Zhu, Degang
    Wang, Menglin
    Li, Junhan
    Zhang, Jie
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 44
  • [32] Comparative Study of Intrusion Detection System and its Recovery mechanism
    Khan, Nabeel Younus
    Rauf, Bilal
    Ahmed, Kabeer
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 5, 2010, : 627 - 631
  • [33] Towards an Adaptive Intrusion Detection System: a Critical and Comparative Study
    Bensefia, Hassina
    Ahmed-Nacer, Mohammed
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 809 - +
  • [34] Adversarial machine learning for network intrusion detection: A comparative study
    Jmila, Houda
    Ibn Khedher, Mohamed
    [J]. COMPUTER NETWORKS, 2022, 214
  • [35] Intrusion Detection using Data Mining: A contemporary comparative study
    Bouteraa, Imad
    Derdour, Makhlouf
    Ahmim, Ahmed
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON PATTERN ANALYSIS AND INTELLIGENT SYSTEMS (PAIS), 2018, : 316 - 323
  • [36] Comparative Study of Machine Learning Algorithm for Intrusion Detection System
    Sravani, K.
    Srinivasu, P.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2013, 2014, 247 : 189 - 196
  • [37] Machine Learning for Network Intrusion Detection-A Comparative Study
    Al Lail, Mustafa
    Garcia, Alejandro
    Olivo, Saul
    [J]. FUTURE INTERNET, 2023, 15 (07):
  • [38] Indirect classification approaches: a comparative study in network intrusion detection
    Khoshgoftaar, Taghi M.
    Gao, Kehan
    Lin, Hua
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2006, 27 (04) : 232 - 245
  • [39] Intrusion detection system using resampled dataset - a comparative study
    Patel, N. D.
    Mehtre, B. M.
    Wankar, Rajeev
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2023, 42 (04) : 243 - 257
  • [40] Graphical techniques in intrusion detection systems
    Gelbord, B
    [J]. 15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 253 - 258