MATHEMATICAL MODELS USED FOR BUILDING INTRUSION DETECTION SYSTEMS
Creators
- 1. Tashkent university of information technologies named after Muhammad al- Khwarizmi
Description
This article provides an overview of the different categories of mathematical models used for building intrusion detection systems (IDS) to protect computer networks from malicious activities. The models discussed include statistical models, rule-based models, machine learning models, fuzzy logic models, and graph-based models, each with its own unique strengths and weaknesses. The research work compares these models based on various criteria, such as accuracy, precision, F1-score, and false alarm rate, and presents the results in a table format. The article also includes statistics on the usage of these models over time and which models were used in the last year. This information provides valuable insights into the trends in intrusion detection systems and the popularity of different models. Overall, the article serves as a useful resource for researchers and practitioners interested in designing effective IDS for securing computer networks.
Files
305-317.pdf
Files
(600.3 kB)
Name | Size | Download all |
---|---|---|
md5:2cbfe7778c964af2d64c3c57e1901908
|
600.3 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 10.5281/zenodo.8045123 (DOI)