Contrasting Computational Frameworks for Intrusion Detection: A Methodological Synthesis
Keywords:
N\AAbstract
This research analyses and compares various machine learning techniques for the purposes of intrusion detection. With the increasing sophistication of cyberthreats, selecting the optimal intrusion detection system (IDS) is crucial to network security. This article examines various modelling techniques including Decision Trees, Random Forest, Support Vector Machines (SVM), and Deep Learning models, using a benchmark dataset including Random Forest, Decision Trees, Support Vector Machines (SVM), and Deep Learning approaches. In the analyzed study, a set of performance measures is calculated using accuracy, precision, recall, and F1 score. Their results are graphically demonstrated and successfully communicated.
Downloads
References
Tavallaee, M., et al. "A detailed analysis of the KDD Cup 99 dataset." International Conference on Computational Intelligence for Security and Defense Applications, 2009.
García-Teodoro, P., et al. "Anomaly-based network intrusion detection: Techniques, systems and challenges." Computers & Security, 2009.
Hodo, E., et al. "Threat analysis of IoT networks using deep learning models." IEEE Transactions on Cybernetics, 2017.
Li, C., et al. "Machine learning techniques for cybersecurity intrusion detection: A review." Journal of Information Security and Applications, 2020.
Buczak, A. L., & Guven, E. "A survey of data mining and machine learning methods for cyber security intrusion detection." IEEE Communications Surveys & Tutorials, 2016.
Sommer, R., & Paxson, V. "Outside the closed world: On using machine learning for network intrusion detection." IEEE Symposium on Security and Privacy, 2010.
Vinayakumar, R., et al. "Deep learning approaches for intrusion detection systems: A survey." Computer Communications, 2019.
Ahmed, M., et al. "A survey of network anomaly detection techniques." Journal of Network and Computer Applications, 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.