{"title":"A Comprehensive Survey on Various Machine Learning Methods used for Intrusion Detection System","authors":"A. Gupta, Jitendra Agrawal","doi":"10.1109/CSNT48778.2020.9115764","DOIUrl":null,"url":null,"abstract":"With the advance in technology, now a day’s cyber-attack is more sophisticated which is not easily detected by the any intrusion detection system (IDS). Since most of the user store their private and sensitive information into the computer or any other digital media so providing security to these computers from the attacker is the essential requirement of each user. As number of intrusion detection system have been proposed in the last few decades. These IDS are mainly classified in two different types named signature based intrusion detection system and anomaly based intrusion detection system. The main objective of this paper is to compare various existing IDS with their strength and weakness. This paper will also discuss various machine learning approach and data sets which are used to detect intrusion. This paper will also discuss various challenges which makes IDS design more challenging.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT48778.2020.9115764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
With the advance in technology, now a day’s cyber-attack is more sophisticated which is not easily detected by the any intrusion detection system (IDS). Since most of the user store their private and sensitive information into the computer or any other digital media so providing security to these computers from the attacker is the essential requirement of each user. As number of intrusion detection system have been proposed in the last few decades. These IDS are mainly classified in two different types named signature based intrusion detection system and anomaly based intrusion detection system. The main objective of this paper is to compare various existing IDS with their strength and weakness. This paper will also discuss various machine learning approach and data sets which are used to detect intrusion. This paper will also discuss various challenges which makes IDS design more challenging.