Published June 15, 2023 | Version v1
Journal article Open

MATHEMATICAL MODELS USED FOR BUILDING INTRUSION DETECTION SYSTEMS

  • 1. Tashkent university of information technologies named after Muhammad al- Khwarizmi

Description

This article provides an overview of the different categories of mathematical models used for building intrusion detection systems (IDS) to protect computer networks from malicious activities. The models discussed include statistical models, rule-based models, machine learning models, fuzzy logic models, and graph-based models, each with its own unique strengths and weaknesses. The research work compares these models based on various criteria, such as accuracy, precision, F1-score, and false alarm rate, and presents the results in a table format. The article also includes statistics on the usage of these models over time and which models were used in the last year. This information provides valuable insights into the trends in intrusion detection systems and the popularity of different models. Overall, the article serves as a useful resource for researchers and practitioners interested in designing effective IDS for securing computer networks.

Files

305-317.pdf

Files (600.3 kB)

Name Size Download all
md5:2cbfe7778c964af2d64c3c57e1901908
600.3 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 10.5281/zenodo.8045123 (DOI)