{"title":"入侵检测分类算法的部署与分析","authors":"Himanshu Pandey, Saumya Bhadauria","doi":"10.1109/IATMSI56455.2022.10119264","DOIUrl":null,"url":null,"abstract":"Intrusion Detection Systems that use anomaly de-tection can detect unknown assaults, but they are less accurate, resulting in many false alarms. In this paper, machine learning techniques are examined in order to create IDSs that may be used in existing computer networks. In order to improve detection quality, a three-step optimization technique is first provided: 1) rebalancing the dataset with augmented data, 2) optimizing model performance, and 3) integrating the results of the best models through ensemble learning. This method has problems because the models are trained on previously known assaults and so do not do anomaly detection. To solve the existing issues, we studied the accuracy, sensitivity, roc curve, false positive rate of various binary and multi-class classifiers like KNN, Linear SVM, Quadratic SVM, multi-layer perceptron(MLP), and some other general classification algorithms, which inferred to us that some advancements could be made to the existing models. We developed a new and better LSTM (Long Short Term Memory) technique, a deep learning technique for recognizing attacks and storing them in long-term memory in order to counter future attacks.","PeriodicalId":221211,"journal":{"name":"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Deploying and Analyzing Classification Algorithms for Intrusion Detection\",\"authors\":\"Himanshu Pandey, Saumya Bhadauria\",\"doi\":\"10.1109/IATMSI56455.2022.10119264\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion Detection Systems that use anomaly de-tection can detect unknown assaults, but they are less accurate, resulting in many false alarms. In this paper, machine learning techniques are examined in order to create IDSs that may be used in existing computer networks. In order to improve detection quality, a three-step optimization technique is first provided: 1) rebalancing the dataset with augmented data, 2) optimizing model performance, and 3) integrating the results of the best models through ensemble learning. This method has problems because the models are trained on previously known assaults and so do not do anomaly detection. To solve the existing issues, we studied the accuracy, sensitivity, roc curve, false positive rate of various binary and multi-class classifiers like KNN, Linear SVM, Quadratic SVM, multi-layer perceptron(MLP), and some other general classification algorithms, which inferred to us that some advancements could be made to the existing models. We developed a new and better LSTM (Long Short Term Memory) technique, a deep learning technique for recognizing attacks and storing them in long-term memory in order to counter future attacks.\",\"PeriodicalId\":221211,\"journal\":{\"name\":\"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IATMSI56455.2022.10119264\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IATMSI56455.2022.10119264","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Deploying and Analyzing Classification Algorithms for Intrusion Detection
Intrusion Detection Systems that use anomaly de-tection can detect unknown assaults, but they are less accurate, resulting in many false alarms. In this paper, machine learning techniques are examined in order to create IDSs that may be used in existing computer networks. In order to improve detection quality, a three-step optimization technique is first provided: 1) rebalancing the dataset with augmented data, 2) optimizing model performance, and 3) integrating the results of the best models through ensemble learning. This method has problems because the models are trained on previously known assaults and so do not do anomaly detection. To solve the existing issues, we studied the accuracy, sensitivity, roc curve, false positive rate of various binary and multi-class classifiers like KNN, Linear SVM, Quadratic SVM, multi-layer perceptron(MLP), and some other general classification algorithms, which inferred to us that some advancements could be made to the existing models. We developed a new and better LSTM (Long Short Term Memory) technique, a deep learning technique for recognizing attacks and storing them in long-term memory in order to counter future attacks.