4.7 Review

A Review on Challenges and Future Research Directions for Machine Learning-Based Intrusion Detection System

向作者/读者索取更多资源

This article provides a detailed overview of intrusion detection using machine learning techniques, discussing the steps performed by ML techniques for detecting and classifying intrusions. It summarizes the state-of-the-art ML techniques used for intrusion detection and classification, along with their advantages and limitations. The paper also addresses the challenges faced by ML-based IDS and discusses future research directions to enhance the efficiency and effectiveness of IDS. This review serves as an incentive for novice researchers interested in working in the field of ML-based IDS.
Research in the field of Intrusion Detection is focused on developing an efficient strategy that can identify network attacks. One of the important strategies is to supervise the network events for identifying attacks. Security mechanisms such as Intrusion Detection Systems (IDS) have been used for securing the network infrastructure and network communication against network attacks, wherein Machine Learning (ML) techniques have a notable contribution to design an efficient IDS. However, dependence on modern communication technology and collateral rise in the network attacks affect the performance of ML techniques. In this article, we discuss a detailed overview of intrusion detection using ML techniques. We discuss the steps performed by ML techniques for detecting and classifying intrusions. Moreover, our paper provides a comprehensive overview of state-of-the-art ML techniques used for intrusion detection and classification along with their advantages and limitations. The paper also summarizes research work performed in the field of ML-based IDS. In this paper, we aim to discuss various challenges faced by ML-based IDS. We further discuss future research directions that can be considered for enhancing the efficiency and effectiveness of IDS. Our review will serve as an incentive to novice researchers who aim to work in the field of ML-based IDS.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据