{"title":"Classifying of Intrusion Detection System Configurations Using Machine Learning Techniques","authors":"M. Daoud, Y. Dahmani, S. Ammar, Abdelkader Ouared","doi":"10.1109/ICISAT54145.2021.9678473","DOIUrl":null,"url":null,"abstract":"The design capability of enhanced IDSs is being sought by the detection community because intrusion detection requirements are different from one environment to another. The design is often based on several main challenges and their development remains a difficult task due to the sophistication of the attacks and the complexity of the environments. This development is mainly based on the configuration management of IDS. This article discusses a collaborative approach to classifying IDS configurations to facilitate the competitive sharing of ideas between researchers and developers in academia and industry and specify down the main research ideas and show where they have had an impact because the manual classification of configurations is considered time consuming, cumbersome and prone to errors. Our intention is to solicit the reuse of solutions and help refine the works of the community.","PeriodicalId":112478,"journal":{"name":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information Systems and Advanced Technologies (ICISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISAT54145.2021.9678473","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The design capability of enhanced IDSs is being sought by the detection community because intrusion detection requirements are different from one environment to another. The design is often based on several main challenges and their development remains a difficult task due to the sophistication of the attacks and the complexity of the environments. This development is mainly based on the configuration management of IDS. This article discusses a collaborative approach to classifying IDS configurations to facilitate the competitive sharing of ideas between researchers and developers in academia and industry and specify down the main research ideas and show where they have had an impact because the manual classification of configurations is considered time consuming, cumbersome and prone to errors. Our intention is to solicit the reuse of solutions and help refine the works of the community.