Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree

Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a comprehensive review of intrusion detection techniques, and commonly used datasets for evaluation. It discusses eva...

Full description

Bibliographic Details
Main Authors: Zahedi Azam, Md. Motaharul Islam, Mohammad Nurul Huda
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10185955/
_version_ 1797746143432540160
author Zahedi Azam
Md. Motaharul Islam
Mohammad Nurul Huda
author_facet Zahedi Azam
Md. Motaharul Islam
Mohammad Nurul Huda
author_sort Zahedi Azam
collection DOAJ
description Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a comprehensive review of intrusion detection techniques, and commonly used datasets for evaluation. It discusses evasion techniques employed by attackers and the challenges in combating them to enhance network security. Researchers strive to improve IDS by accurately detecting intruders, reducing false positives, and identifying new threats. Machine learning (ML) and deep learning (DL) techniques are adopted in IDS systems, showing potential in efficiently detecting intruders across networks. The paper explores the latest trends and advancements in ML and DL-based network intrusion detection systems (NIDS), including methodology, evaluation metrics, and dataset selection. It emphasizes research obstacles and proposes a future research model to address weaknesses in the methodologies. The decision tree, known for its speed and user-friendliness, is proposed as a model for detecting result anomalies, combining findings from a comparative survey. This research aims to provide insights into building an effective decision tree-based detection framework.
first_indexed 2024-03-12T15:32:49Z
format Article
id doaj.art-cc08d8da1f2b4f34a5476d90784b096b
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-12T15:32:49Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-cc08d8da1f2b4f34a5476d90784b096b2023-08-09T23:00:24ZengIEEEIEEE Access2169-35362023-01-0111803488039110.1109/ACCESS.2023.329644410185955Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision TreeZahedi Azam0https://orcid.org/0009-0000-7617-8030Md. Motaharul Islam1https://orcid.org/0000-0002-8030-3225Mohammad Nurul Huda2Department of Computer Science and Engineering, United International University, Dhaka, BangladeshDepartment of Computer Science and Engineering, United International University, Dhaka, BangladeshDepartment of Computer Science and Engineering, United International University, Dhaka, BangladeshCyber-attacks pose increasing challenges in precisely detecting intrusions, risking data confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a comprehensive review of intrusion detection techniques, and commonly used datasets for evaluation. It discusses evasion techniques employed by attackers and the challenges in combating them to enhance network security. Researchers strive to improve IDS by accurately detecting intruders, reducing false positives, and identifying new threats. Machine learning (ML) and deep learning (DL) techniques are adopted in IDS systems, showing potential in efficiently detecting intruders across networks. The paper explores the latest trends and advancements in ML and DL-based network intrusion detection systems (NIDS), including methodology, evaluation metrics, and dataset selection. It emphasizes research obstacles and proposes a future research model to address weaknesses in the methodologies. The decision tree, known for its speed and user-friendliness, is proposed as a model for detecting result anomalies, combining findings from a comparative survey. This research aims to provide insights into building an effective decision tree-based detection framework.https://ieeexplore.ieee.org/document/10185955/Intrusion detection systemmachine learninginductive learningDDoS attacksdecision treesupervised and unsupervised learning
spellingShingle Zahedi Azam
Md. Motaharul Islam
Mohammad Nurul Huda
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
IEEE Access
Intrusion detection system
machine learning
inductive learning
DDoS attacks
decision tree
supervised and unsupervised learning
title Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
title_full Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
title_fullStr Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
title_full_unstemmed Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
title_short Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree
title_sort comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree
topic Intrusion detection system
machine learning
inductive learning
DDoS attacks
decision tree
supervised and unsupervised learning
url https://ieeexplore.ieee.org/document/10185955/
work_keys_str_mv AT zahediazam comparativeanalysisofintrusiondetectionsystemsandmachinelearningbasedmodelanalysisthroughdecisiontree
AT mdmotaharulislam comparativeanalysisofintrusiondetectionsystemsandmachinelearningbasedmodelanalysisthroughdecisiontree
AT mohammadnurulhuda comparativeanalysisofintrusiondetectionsystemsandmachinelearningbasedmodelanalysisthroughdecisiontree