Intrusion Detection Systems Using Machine Learning.
DOI:
https://doi.org/10.59890/ijaamr.v2i1.550Keywords:
Machine Learning, Intrusion, Detection, Detection, Supervised, UnsupervisedAbstract
The utilization of machine learning to enhance Intrusion Detection Systems (IDS). It encompasses an exploration of diverse IDS categories, fundamental evaluation metrics, and the dynamic landscape of machine learning methodologies. Recent trends underscore a shift towards the adoption of deep learning techniques for improving attack detection capabilities. Challenges arise from heightened model complexity and increased resource requirements. The paper also suggests future directions that encompass the development of updated datasets and the efficient management of resources through cloud integration. Throughout, this study emphasizes the continuous demand for research and innovation in the field of cybersecurity.
References
Anderson, P. Computer Security Threat Monitoring and Surveillance. 1980. Available online: https://csrc.nist.gov/csrc/media/ publications/conference- paper/1998/10/08/proceedingsof-the-21st- nissc-1998/documents/early-cs- papers/ande80.pdf (accessed on 19 May 2022.
Checkpoint. What Is an Intrusion Detection System? Available online: https://www.checkpoint.com/cyber- hub/networksecurity/what-is-an-intrusion- detection-systemids/ (accessed on 19 May 2022).
IBM Cloud Education. Unsupervised Learning. Available online: https://www.ibm.com/cloud/learn/unsupervi sed-learning (accessed on 19 May 2022)
IBM Cloud Education. Machine Learning. Available online: https://www.ibm.com/cloud/learn/machine- learning (accessed on 19 May 2022).
IBM Cloud Education. Supervised Learning. Available online: https://www.ibm.com/cloud/learn/supervise d-learning (accessed on 19 May 2022).
Sabahi, F.; Movaghar, A. Intrusion Detection: A Survey. In Proceedings of the 2008 Third International Conference on Systems and Networks Communications, Sliema, Malta, 26–31 October 2008; pp. 23–
Seldon. Machine Learning Regression Explained. Available online: https://www.seldon.io/machine- learning-regressionexplained (accessed on 19 May 2022).
Terence, S. All Machine Learning Models Explained in 6 Minutes. Available online: https://www.ibm.com/cloud/learn/ unsupervised-learning (accessed on 19 May 2022).
ThreatStack. The History of Intrusion Detection Systems (IDS)—Part 1. Available online: https://www.threatstack.com/blog/ the-history-of-intrusion-detection-systems- ids-part-1 (accessed on 19 May 2022).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Rohit Utekar, Anuja Phapale

This work is licensed under a Creative Commons Attribution 4.0 International License.



