A Survey of Methods for the Construction of an Intrusion Detection System - Université d'Angers Accéder directement au contenu
Communication Dans Un Congrès Année : 2020

A Survey of Methods for the Construction of an Intrusion Detection System

Résumé

Cybercrimes committed using computer networks lead to billions of dollars lose, the illegal access into computer system, stealing valuable data and destroying organization networks which in turn affect the cyber resources. Because of the expansion of attacks or threats on the networks infrastructure, which is nothing but can be consider as an illegitimate intrusion, based on the machine learning methodology, the intrusion detection system (IDS) can consider as one of the most used cyber security mechanisms, thus to detect the promiscuous activities against sensitive and private data. In this paper our target is to provide a guide lines for researchers and developers discussing the IDS construction phases and their latest techniques, we will clarify the most applied data sources employed in the proposition of a model that will be built for the purpose of creating an intelligent detection system. Furthermore, this survey presents the most commons and latest methods employed and used for designing an IDS based on the data mining techniques and discusses the artifacts removal by summarizing the advantages with the disadvantages of the currents methods and addressing the last novel steps into this field of research.
Fichier non déposé

Dates et versions

hal-02514044 , version 1 (21-03-2020)

Identifiants

Citer

Abdel Karim Kassem, Shymaa Abo Arkoub, Bassam Daya, Pierre Chauvet. A Survey of Methods for the Construction of an Intrusion Detection System. International Conference on Artificial Intelligence and Applied Mathematics in Engineering (ICAIAME 2019), Apr 2019, Antalya, Turkey. pp.211-225, ⟨10.1007/978-3-030-36178-5_18⟩. ⟨hal-02514044⟩
47 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More