{"title":"基于机器学习算法的入侵检测系统综述","authors":"Sandy Victor Amanoul, A. Abdulazeez","doi":"10.1109/CSPA55076.2022.9782043","DOIUrl":null,"url":null,"abstract":"Due to the widespread use of the internet, computer networks are vulnerable to cyber-attacks, prompting various researchers to suggest intrusion detection systems (IDSs). Detecting intrusions is one of the important research topics in network security. As a precaution to guarantee the network's security, it aids in the detection of unwanted usage and assaults. This study summarizes significant literature reviews on machine learning (ML), and deep learning (DL) approaches for intrusion detection network analysis and includes a brief instructional overview of each ML / DL method. The papers describing each approach were indexed and summarized according to the dataset used, and the highest level of accuracy was attained.","PeriodicalId":174315,"journal":{"name":"2022 IEEE 18th International Colloquium on Signal Processing & Applications (CSPA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Intrusion Detection System Based on Machine Learning Algorithms: A Review\",\"authors\":\"Sandy Victor Amanoul, A. Abdulazeez\",\"doi\":\"10.1109/CSPA55076.2022.9782043\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the widespread use of the internet, computer networks are vulnerable to cyber-attacks, prompting various researchers to suggest intrusion detection systems (IDSs). Detecting intrusions is one of the important research topics in network security. As a precaution to guarantee the network's security, it aids in the detection of unwanted usage and assaults. This study summarizes significant literature reviews on machine learning (ML), and deep learning (DL) approaches for intrusion detection network analysis and includes a brief instructional overview of each ML / DL method. The papers describing each approach were indexed and summarized according to the dataset used, and the highest level of accuracy was attained.\",\"PeriodicalId\":174315,\"journal\":{\"name\":\"2022 IEEE 18th International Colloquium on Signal Processing & Applications (CSPA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 18th International Colloquium on Signal Processing & Applications (CSPA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSPA55076.2022.9782043\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 18th International Colloquium on Signal Processing & Applications (CSPA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSPA55076.2022.9782043","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion Detection System Based on Machine Learning Algorithms: A Review
Due to the widespread use of the internet, computer networks are vulnerable to cyber-attacks, prompting various researchers to suggest intrusion detection systems (IDSs). Detecting intrusions is one of the important research topics in network security. As a precaution to guarantee the network's security, it aids in the detection of unwanted usage and assaults. This study summarizes significant literature reviews on machine learning (ML), and deep learning (DL) approaches for intrusion detection network analysis and includes a brief instructional overview of each ML / DL method. The papers describing each approach were indexed and summarized according to the dataset used, and the highest level of accuracy was attained.