{"title":"入侵检测系统中各种机器学习方法综述","authors":"A. Gupta, Jitendra Agrawal","doi":"10.1109/CSNT48778.2020.9115764","DOIUrl":null,"url":null,"abstract":"With the advance in technology, now a day’s cyber-attack is more sophisticated which is not easily detected by the any intrusion detection system (IDS). Since most of the user store their private and sensitive information into the computer or any other digital media so providing security to these computers from the attacker is the essential requirement of each user. As number of intrusion detection system have been proposed in the last few decades. These IDS are mainly classified in two different types named signature based intrusion detection system and anomaly based intrusion detection system. The main objective of this paper is to compare various existing IDS with their strength and weakness. This paper will also discuss various machine learning approach and data sets which are used to detect intrusion. This paper will also discuss various challenges which makes IDS design more challenging.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"A Comprehensive Survey on Various Machine Learning Methods used for Intrusion Detection System\",\"authors\":\"A. Gupta, Jitendra Agrawal\",\"doi\":\"10.1109/CSNT48778.2020.9115764\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advance in technology, now a day’s cyber-attack is more sophisticated which is not easily detected by the any intrusion detection system (IDS). Since most of the user store their private and sensitive information into the computer or any other digital media so providing security to these computers from the attacker is the essential requirement of each user. As number of intrusion detection system have been proposed in the last few decades. These IDS are mainly classified in two different types named signature based intrusion detection system and anomaly based intrusion detection system. The main objective of this paper is to compare various existing IDS with their strength and weakness. This paper will also discuss various machine learning approach and data sets which are used to detect intrusion. This paper will also discuss various challenges which makes IDS design more challenging.\",\"PeriodicalId\":131745,\"journal\":{\"name\":\"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSNT48778.2020.9115764\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT48778.2020.9115764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comprehensive Survey on Various Machine Learning Methods used for Intrusion Detection System
With the advance in technology, now a day’s cyber-attack is more sophisticated which is not easily detected by the any intrusion detection system (IDS). Since most of the user store their private and sensitive information into the computer or any other digital media so providing security to these computers from the attacker is the essential requirement of each user. As number of intrusion detection system have been proposed in the last few decades. These IDS are mainly classified in two different types named signature based intrusion detection system and anomaly based intrusion detection system. The main objective of this paper is to compare various existing IDS with their strength and weakness. This paper will also discuss various machine learning approach and data sets which are used to detect intrusion. This paper will also discuss various challenges which makes IDS design more challenging.