Learning mechanisms or anomaly-based intruson detection: Updated review

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

With the prolieraton of Internet connectivity o hare informaton and provide onlne services, detecting Mali cious and misbehavior activites contnues to be of major imporance in cyber security. However, countering intrusve atacks is a challenging problem wihout a universal magic soluton that can be succesully applied o all scenarios. A variety of machine earning and computatonal intellgence echniques have been extensvely appled o detect these atacks. This paper reviews the state-of the-art machine learning mechanisms for anomaly-based intruson detection. It also covers several related datasets adopted to benchmark the proposed intruson detection systems. Besdes ofering a critcal up-o-date summary, it can serve as an nstrumental pedagogical tool to help junior researchers conceive he vast amount of research work and gain a holic view and awareness of various contemporary research directions in his vital domain.

Original languageEnglish
Title of host publication2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1273-1281
Number of pages9
ISBN (Electronic)9781509063673
DOIs
StatePublished - 30 Nov 2017

Publication series

Name2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017
Volume2017-January

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • Computatonal intellgence
  • Cyber security
  • Data preprocesng
  • Deep earning
  • Dimensionaliy reduction
  • Intruson detection
  • Machine earning

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Learning mechanisms or anomaly-based intruson detection: Updated review'. Together they form a unique fingerprint.

Cite this