Javascript must be enabled to continue!
The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review
View through CrossRef
In supervised learning-based classification, ensembles have been successfully employed to different application domains. In the literature, many researchers have proposed different ensembles by considering different combination methods, training datasets, base classifiers, and many other factors. Artificial-intelligence-(AI-) based techniques play prominent role in development of ensemble for intrusion detection (ID) and have many benefits over other techniques. However, there is no comprehensive review of ensembles in general and AI-based ensembles for ID to examine and understand their current research status to solve the ID problem. Here, an updated review of ensembles and their taxonomies has been presented in general. The paper also presents the updated review of various AI-based ensembles for ID (in particular) during last decade. The related studies of AI-based ensembles are compared by set of evaluation metrics driven from (1) architecture & approach followed; (2) different methods utilized in different phases of ensemble learning; (3) other measures used to evaluate classification performance of the ensembles. The paper also provides the future directions of the research in this area. The paper will help the better understanding of different directions in which research of ensembles has been done in general and specifically: field of intrusion detection systems (IDSs).
Title: The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review
Description:
In supervised learning-based classification, ensembles have been successfully employed to different application domains.
In the literature, many researchers have proposed different ensembles by considering different combination methods, training datasets, base classifiers, and many other factors.
Artificial-intelligence-(AI-) based techniques play prominent role in development of ensemble for intrusion detection (ID) and have many benefits over other techniques.
However, there is no comprehensive review of ensembles in general and AI-based ensembles for ID to examine and understand their current research status to solve the ID problem.
Here, an updated review of ensembles and their taxonomies has been presented in general.
The paper also presents the updated review of various AI-based ensembles for ID (in particular) during last decade.
The related studies of AI-based ensembles are compared by set of evaluation metrics driven from (1) architecture & approach followed; (2) different methods utilized in different phases of ensemble learning; (3) other measures used to evaluate classification performance of the ensembles.
The paper also provides the future directions of the research in this area.
The paper will help the better understanding of different directions in which research of ensembles has been done in general and specifically: field of intrusion detection systems (IDSs).
Related Results
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Network intrusion detection method based on IEHO-SVM
Network intrusion detection method based on IEHO-SVM
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intr...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...
Indication of subsurface seawater intrusion into the Indus delta, Sindh, Pakistan
Indication of subsurface seawater intrusion into the Indus delta, Sindh, Pakistan
Due to climate change impacts, seawater intrusion is a major issue in various river deltas around the globe, including the Indus delta, Pakistan. The seawater intrusion has severel...
Open-Bite Correction Using a Mid-Palatal TAD with an Intrusion TPA: Anteroposterior Position of TAD
Open-Bite Correction Using a Mid-Palatal TAD with an Intrusion TPA: Anteroposterior Position of TAD
Mechanics using a mid-palatal temporary anchorage device (TAD) and an intrusion transpalatal arch (TPA) were applied to correct the open bites. Two different intrusion patterns cou...
Intrusion Detection in Wireless Sensor Networks using SMOTE Tomek Link sampling technique
Intrusion Detection in Wireless Sensor Networks using SMOTE Tomek Link sampling technique
Wireless Sensor Networks (WSNs) are an essential component of cyber-physical systems, characterized by the integration of stationary and mobile sensors that collaboratively capture...
Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms
Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms
<abstract>
<p>Intrusion detection system plays an important role in network security. Early detection of the potential attacks can prevent the further network intrusion...

