A Technical Evaluation of the Performance of Classical Artificial Intelligence (AI) and Methods Based on Computational Intelligence (CI) i.e Supervised Learning, Unsupervised Learning And Ensemble Algorithms in Intrusion Detection Systems
dc.contributor.author | Zvarevashe, Kudakwashe | |
dc.contributor.author | Mapanga, Innocent | |
dc.contributor.author | Kadebu, Prudence | |
dc.date.accessioned | 2024-03-14T09:04:01Z | |
dc.date.available | 2024-03-14T09:04:01Z | |
dc.date.issued | 2016-11 | |
dc.description.abstract | The emergence of new technologies in this dynamic information era has caused a tremendous increase in the rate at which data is being generated through interactive applications thereby increasing the movement of information and data on communication networks as individuals, organizations and business interact on a daily basis. Big Data is flooding our networks and storage devices stimulating a cause for concern in terms of processing, storage, access and security of large blocks of data in most networks. The facilitation of online research services is always under the risk of intruders and malicious activity. Most techniques used in today's Intrusion Detection Systems are not able to deal with the dynamic and complex nature of cyber-attacks on computer networks. Over the years, Intrusion Detection Systems .Various methods have been developed by many researchers to detect intrusions aimed at networks as well as standalone devices which are based on machine learning algorithms, neural networks, statistical methods etc. In this paper, we study several such schemes and compare their performance. The experiments are done using WEKA (Waikato Environment for Knowledge Analysis) and one of the most popular Intrusion Detection Systems datasets which is NSL-KDD99 so as to analyse the consistency of each algorithm. We divide the schemes into methods based on classical artificial intelligence (AI) and methods based on computational intelligence (CI) i.e supervised learning, unsupervised learning, ensemble and immune algorithms. We explain how various characteristics of CI techniques can be used to build efficient IDS. This paper will further evaluate the performance of the algorithms using the following parameters: accuracy, detection rate and false alarm. | |
dc.identifier.uri | https://africarxiv.ubuntunet.net/handle/1/458 | |
dc.identifier.uri | https://doi.org/10.60763/africarxiv/416 | |
dc.identifier.uri | https://doi.org/10.60763/africarxiv/416 | |
dc.identifier.uri | https://doi.org/10.60763/africarxiv/416 | |
dc.subject | Technical Evaluation | |
dc.subject | Classical Artificial Intelligence (AI) | |
dc.subject | Methods Based on Computational Intelligence (CI) | |
dc.subject | Supervised Learning | |
dc.subject | Unsupervised Learning | |
dc.subject | Ensemble Algorithms | |
dc.subject | Intrusion Detection Systems | |
dc.title | A Technical Evaluation of the Performance of Classical Artificial Intelligence (AI) and Methods Based on Computational Intelligence (CI) i.e Supervised Learning, Unsupervised Learning And Ensemble Algorithms in Intrusion Detection Systems |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- A Technical Evaluation of the Performance of Classical Artificial Intelligence (AI) And Methods Based on Computational Intelligence (CI) i.e Supervised Learning, Unsupervised Learning And Ensemble Algorithms In Intrusion Detection Systems .pdf
- Size:
- 334.19 KB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.72 KB
- Format:
- Item-specific license agreed to upon submission
- Description: