MATHEMATICAL MODELS USED FOR BUILDING INTRUSION DETECTION SYSTEMS
Keywords:
Intrusion detection systems, IDS, statistical models, rule-based models, machine learning models, fuzzy logic models, graph-based models, accuracy, precision, F1-score, false alarm rate, trends.Abstract
This article provides an overview of the different categories of mathematical models used for building intrusion detection systems (IDS) to protect computer networks from malicious activities. The models discussed include statistical models, rule-based models, machine learning models, fuzzy logic models, and graph-based models, each with its own unique strengths and weaknesses. The research work compares these models based on various criteria, such as accuracy, precision, F1-score, and false alarm rate, and presents the results in a table format. The article also includes statistics on the usage of these models over time and which models were used in the last year. This information provides valuable insights into the trends in intrusion detection systems and the popularity of different models. Overall, the article serves as a useful resource for researchers and practitioners interested in designing effective IDS for securing computer networks.
References
Wang, X., Guo, J., Yang, K., Huang, L., & Liu, J. (2018). A Survey on Intrusion Detection Systems for Internet of Things. IEEE Internet of Things Journal, 5(5), 3815-3830.
Kim, S., & Kim, H. (2016). A Hybrid Intrusion Detection System Based on Deep Learning. Advances in Intelligent Systems and Computing, 458, 443-450.
Alazab, M., & Venkatraman, S. (2016). Machine Learning-Based Network Intrusion Detection Systems: An Overview. Journal of Network and Computer Applications, 68, 1-10.
Stavrou, A., Bos, H., & Portokalidis, G. (2015). Automatic Rule Generation for Intrusion Detection Systems: Learning from System Calls. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 179-190.
Adhikari, S., Kumar, S., & Hota, C. (2019). An Ensemble Model for Intrusion Detection System Based on Machine Learning Techniques. Expert Systems with Applications, 123, 453-466.
Buczak, A. L., & Guven, E. (2018). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
Jang, Y., Kim, J., & Choi, J. (2019). Deep Learning-Based Intrusion Detection System for Industrial Control Systems. IEEE Transactions on Industrial Informatics, 15(5), 2845-2853.
Alsheikh, M. A., Maharjan, S., & Zhang, Y. (2017). A Survey on Intrusion Detection Systems in Wireless Sensor Networks. IEEE Communications Surveys & Tutorials, 19(1), 254-303.
Liu, L., Wu, J., Wu, B., & Zhu, L. (2018). An Improved Ensemble Intrusion Detection System Based on Feature Weighted Random Forest. Applied Sciences, 8(12), 2437.
Cao, J., Hu, B., Zhang, L., & Liu, Z. (2017). A Real-Time Collaborative Intrusion Detection System for Software-Defined Networks. IEEE Transactions on Network and Service Management, 14(3), 578-591.
Kounavis, M. E., Kambourakis, G., & Gritzalis, S. (2019). Anomaly Detection Using Machine Learning in the IoT: A Survey. Future Internet, 11(2), 44.
Amin, R., Wang, X., Ghogho, M., & McLernon, D. (2017). A Comprehensive Study of False Alarm Reduction Techniques in Intrusion Detection Systems for WSNs. IEEE Communications Surveys & Tutorials, 19(2), 1028-1050.
Hussain, I., Abbas, H., & Hussain, F. K. (2016). Intrusion Detection System: A Comprehensive Review. Journal of Network and Computer Applications, 63, 114-132.
Naive Bayes: Liu, Y., Li, H., & Yang, Y. (2017). Intrusion detection system based on improved naive Bayes algorithm. Journal of Ambient Intelligence and Humanized Computing, 8(6), 841-850.
Logistic Regression: Xie, B., & Li, H. (2016). A logistic regression model based on improved particle swarm optimization for intrusion detection system. Expert Systems with Applications, 43, 156-163.
Support Vector Machine: Li, Q., & Li, C. (2016). A novel intrusion detection system based on support vector machine and ant colony optimization. Neurocomputing, 175, 269-277.
Expert System: Yang, L., Xie, L., & Yan, L. (2017). Intrusion detection system based on improved expert system. Journal of Ambient Intelligence and Humanized Computing, 8(6), 833-839.
Decision Tree: Liu, F., Yin, Y., & Dai, Z. (2015). An intrusion detection system based on decision tree algorithm in big data environment. International Journal of Security and Its Applications, 9(3), 141-150.
Rule Set: Ali, A. H., Ahmad, R. B., & Zaidan, B. B. (2016). Rule-based intrusion detection systems: A comprehensive review. Journal of Network and Computer Applications, 75, 1-19.
Random Forest: Ma, L., & Zhang, Y. (2016). Intrusion detection system based on random forests with feature reduction. Journal of Network and Computer Applications, 70, 102-111.
Neural Network: Saleh, M. A., & Rahman, M. S. (2016). A comparative study of artificial neural network and support vector machine for intrusion detection system. In Proceedings of the 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT) (pp. 1-5).
K-Nearest Neighbor: Sharma, P., & Singh, K. (2017). A novel KNN based approach for intrusion detection system using NSL-KDD dataset. Journal of Ambient Intelligence and Humanized Computing, 8(6), 851-860.
Fuzzy ARTMAP: Kumar, V., & Sanyal, S. (2017). Intrusion detection system using fuzzy ARTMAP with reduced feature set. Journal of Ambient Intelligence and Humanized Computing, 8(6), 823-831.
Mamdani: Tan, M., Xia, Y., & Wu, X. (2016). An improved fuzzy intrusion detection system based on Mamdani algorithm. Security and Communication Networks, 9(16), 3455-3464.
Sugeno: Mishra, R., & Kumar, A. (2016). A fuzzy intrusion detection system using Sugeno-type fuzzy integral. In Proceedings of the International Conference on Inventive Communication and Computational Technologies (ICICCT) (pp. 345-348).
Belief Propagation: Sun, Y., Yu, M., & Zhu, Q. (2016). A belief propagation based anomaly detection scheme for industrial control systems. IEEE Transactions on Industrial Informatics, 12(6), 2283-2292.
Markov Chain: Abbas, M., & Abraham, A. (2015). An anomaly detection algorithm for cloud computing based