A Technical Evaluation of the Performance of Classical Artificial Intelligence (AI) and Methods Based on Computational Intelligence (CI) i.e Supervised Learning, Unsupervised Learning And Ensemble Algorithms in Intrusion Detection Systems

dc.contributor.authorZvarevashe, Kudakwashe
dc.contributor.authorMapanga, Innocent
dc.contributor.authorKadebu, Prudence
dc.date.accessioned2024-03-14T09:04:01Z
dc.date.available2024-03-14T09:04:01Z
dc.date.issued2016-11
dc.description.abstractThe emergence of new technologies in this dynamic information era has caused a tremendous increase in the rate at which data is being generated through interactive applications thereby increasing the movement of information and data on communication networks as individuals, organizations and business interact on a daily basis. Big Data is flooding our networks and storage devices stimulating a cause for concern in terms of processing, storage, access and security of large blocks of data in most networks. The facilitation of online research services is always under the risk of intruders and malicious activity. Most techniques used in today's Intrusion Detection Systems are not able to deal with the dynamic and complex nature of cyber-attacks on computer networks. Over the years, Intrusion Detection Systems .Various methods have been developed by many researchers to detect intrusions aimed at networks as well as standalone devices which are based on machine learning algorithms, neural networks, statistical methods etc. In this paper, we study several such schemes and compare their performance. The experiments are done using WEKA (Waikato Environment for Knowledge Analysis) and one of the most popular Intrusion Detection Systems datasets which is NSL-KDD99 so as to analyse the consistency of each algorithm. We divide the schemes into methods based on classical artificial intelligence (AI) and methods based on computational intelligence (CI) i.e supervised learning, unsupervised learning, ensemble and immune algorithms. We explain how various characteristics of CI techniques can be used to build efficient IDS. This paper will further evaluate the performance of the algorithms using the following parameters: accuracy, detection rate and false alarm.
dc.identifier.urihttps://africarxiv.ubuntunet.net/handle/1/458
dc.identifier.urihttps://doi.org/10.60763/africarxiv/416
dc.identifier.urihttps://doi.org/10.60763/africarxiv/416
dc.identifier.urihttps://doi.org/10.60763/africarxiv/416
dc.subjectTechnical Evaluation
dc.subjectClassical Artificial Intelligence (AI)
dc.subjectMethods Based on Computational Intelligence (CI)
dc.subjectSupervised Learning
dc.subjectUnsupervised Learning
dc.subjectEnsemble Algorithms
dc.subjectIntrusion Detection Systems
dc.titleA Technical Evaluation of the Performance of Classical Artificial Intelligence (AI) and Methods Based on Computational Intelligence (CI) i.e Supervised Learning, Unsupervised Learning And Ensemble Algorithms in Intrusion Detection Systems

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
A Technical Evaluation of the Performance of Classical Artificial Intelligence (AI) And Methods Based on Computational Intelligence (CI) i.e Supervised Learning, Unsupervised Learning And Ensemble Algorithms In Intrusion Detection Systems .pdf
Size:
334.19 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.72 KB
Format:
Item-specific license agreed to upon submission
Description: