Comprehensive Examination of Network Intrusion Detection Models on Data Science

被引:0
|
作者
Shyla [1 ]
Bhatnagar, Vishal [2 ]
机构
[1] Guru Gobind Singh Indraprastha Univ, Comp Sci & Engn, Delhi, India
[2] Ambedkar Inst Adv Commun Technol & Res, GGSIPU, Govt Delhi, Comp Sci Engn Dept, Delhi, India
关键词
Artificial Neural Network; Bagging; Data Science; Deep Neural Network; Intrusion Detection; Naive Bayes; Random Forest; Random Tree; DEEP LEARNING APPROACH; FEATURE-SELECTION; DETECTION SYSTEMS; COMPONENT ANALYSIS; K-MEANS; ALGORITHM; CLASSIFIER; FUSION; IDS; SOM;
D O I
10.4018/IJIRR.2021100102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased requirement of data science in recent times has given rise to the concept of data security, which has become a major issue; thus, the amalgamation of data science methodology with intrusion detection systems as a field of research has acquired a lot of prominence. The level of access to the information system and its visibility to user pursuit was required to operate securely. Intrusion detection has been gaining popularity in the area of data science to incorporate the overall information security infrastructure, where regular operations depend upon shared use of information. The problems are to build an intrusion detection system efficient enough for detecting attacks and to reduce the false positives with a high detection rate. In this paper, the authors analyse various techniques of intrusion detection combined with data science, which will help in understanding the best fit technique under different circumstances.
引用
收藏
页码:14 / 40
页数:27
相关论文
共 50 条
  • [1] An Evaluation of Data Mining Classification Models for Network Intrusion Detection
    So-In, Chakchai
    Mongkonchai, Nutakarn
    Aimtongkham, Phet
    Wijitsopon, Kasidit
    Rujirakul, Kanokmon
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND IT'S APPLICATIONS (DICTAP), 2014, : 90 - 94
  • [2] Visualizing network data for intrusion detection
    Abdullah, K
    Lee, A
    Conti, G
    Copeland, JA
    [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 100 - 108
  • [3] Data analytics for network intrusion detection
    Wang, Lidong
    Jones, Randy
    [J]. Journal of Cyber Security Technology, 2020, 4 (02) : 106 - 123
  • [4] Data Preprocessing for Network Intrusion Detection
    Li, Li
    Ye, Yuan
    [J]. INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 867 - 871
  • [5] Comparison of Multiple Algorithmic Models for Malicious Attack Data Detection of Network Intrusion
    Ma, Ronghua
    [J]. International Journal of Network Security, 2022, 24 (03) : 410 - 415
  • [6] Empirical Analysis of Data Streaming and Batch Learning Models for Network Intrusion Detection
    Adewole, Kayode S.
    Salau-Ibrahim, Taofeekat T.
    Imoize, Agbotiname Lucky
    Oladipo, Idowu Dauda
    AbdulRaheem, Muyideen
    Awotunde, Joseph Bamidele
    Balogun, Abdullateef O.
    Isiaka, Rafiu Mope
    Aro, Taye Oladele
    [J]. ELECTRONICS, 2022, 11 (19)
  • [7] A Comprehensive Network Intrusion Detection and Prevention System Architecture
    Mirpuryan, Minoo Sadat
    Tavizi, Tina
    Gharaee, Hossein
    [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 954 - 958
  • [8] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
  • [9] Intrusion Detection Models Based on Data Mining
    Guojun Mao
    Xindong Wu
    Xuxian Jiang
    [J]. International Journal of Computational Intelligence Systems, 2012, 5 : 30 - 38
  • [10] Data fusion and network intrusion detection systems
    Ahmad, Rasheed
    Alsmadi, Izzat
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7493 - 7519