A Novel Pipeline to Recommend Intrusion Detection Systems Configurations

Mohamde Amine Daoud, Abdelkader Ouared, Y. Dahmani, Sabrina Ammar
{"title":"A Novel Pipeline to Recommend Intrusion Detection Systems Configurations","authors":"Mohamde Amine Daoud, Abdelkader Ouared, Y. Dahmani, Sabrina Ammar","doi":"10.1109/NTIC55069.2022.10100585","DOIUrl":null,"url":null,"abstract":"Intrusion Detection Systems (IDS) are becoming increasingly important to provide a certain level of safety in a variety of complex environments. An IDS’s proper operation is dependent on the quality of the subjective measurements that influence its quality. All steps of the IDS development life cycle must be covered to increase quality. The design phase of such a system may take long enough to show its evolution. Furthermore, each provided IDS model has a level of precision that is frequently related to the state of the system that needs to be examined. To avoid this problem, it is necessary to guide the designer in selecting suitable models and tests. In light of this, a dedicated framework has been proposed to recommend IDS instance configurations. This scope combines clustering and classification techniques to produce a resilient instance IDS analysis that ensures good independent performance from system variations. The study’s findings demonstrate that combining approaches resulted in consistent performance and high prediction accuracy.","PeriodicalId":403927,"journal":{"name":"2022 2nd International Conference on New Technologies of Information and Communication (NTIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on New Technologies of Information and Communication (NTIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTIC55069.2022.10100585","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Intrusion Detection Systems (IDS) are becoming increasingly important to provide a certain level of safety in a variety of complex environments. An IDS’s proper operation is dependent on the quality of the subjective measurements that influence its quality. All steps of the IDS development life cycle must be covered to increase quality. The design phase of such a system may take long enough to show its evolution. Furthermore, each provided IDS model has a level of precision that is frequently related to the state of the system that needs to be examined. To avoid this problem, it is necessary to guide the designer in selecting suitable models and tests. In light of this, a dedicated framework has been proposed to recommend IDS instance configurations. This scope combines clustering and classification techniques to produce a resilient instance IDS analysis that ensures good independent performance from system variations. The study’s findings demonstrate that combining approaches resulted in consistent performance and high prediction accuracy.
一种新的推荐入侵检测系统配置的管道
入侵检测系统(IDS)对于在各种复杂环境中提供一定程度的安全性变得越来越重要。IDS的正常运行取决于影响其质量的主观测量的质量。必须涵盖IDS开发生命周期的所有步骤以提高质量。这样一个系统的设计阶段可能需要足够长的时间来显示它的演变。此外,所提供的每个IDS模型都有一个精度级别,该级别通常与需要检查的系统状态相关。为了避免这一问题,有必要指导设计人员选择合适的模型和试验。考虑到这一点,已经提出了一个专门的框架来推荐IDS实例配置。此范围结合了聚类和分类技术,以生成弹性实例IDS分析,确保良好的独立性能,不受系统变化的影响。研究结果表明,组合方法可以获得一致的性能和较高的预测精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信