Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Optimization of Intrusion Detection Systems Determined by Ameliorated HNADAM-SGD Algorithm

Version 1 : Received: 18 December 2021 / Approved: 21 December 2021 / Online: 21 December 2021 (11:45:39 CET)

A peer-reviewed article of this Preprint also exists.

Shyla, S.; Bhatnagar, V.; Bali, V.; Bali, S. Optimization of Intrusion Detection Systems Determined by Ameliorated HNADAM-SGD Algorithm. Electronics 2022, 11, 507. Shyla, S.; Bhatnagar, V.; Bali, V.; Bali, S. Optimization of Intrusion Detection Systems Determined by Ameliorated HNADAM-SGD Algorithm. Electronics 2022, 11, 507.

Abstract

A single Information security is of pivotal concern for consistently streaming information over the widespread internetwork. The bottleneck flow of incoming and outgoing data traffic introduces the issue of malicious activities taken place by intruders, hackers and attackers in the form of authenticity desecration, gridlocking data traffic, vandalizing data and crashing the established network. The issue of emerging suspicious activities is managed by the domain of Intrusion Detection Systems (IDS). The IDS consistently monitors the network for identifica-tion of suspicious activities and generates alarm and indication in presence of malicious threats and worms. The performance of IDS is improved by using different signature based machine learning algorithms. In this paper, the performance of IDS model is determined using hybridization of nestrov-accelerated adaptive moment estimation –stochastic gradient descent (HNADAM-SDG) algorithm. The performance of the algorithm is compared with other classi-fication algorithms as logistic regression, ridge classifier and ensemble algorithm by adapting feature selection and optimization techniques

Keywords

Intrusion Detection System (IDS); HNADAM-SDG(Hybrid Nestrov-Accelerated Adaptive Moment Estimation –Stochastic Gradient Descent); Network-based Intrusion Detection System (NIDS); Host-based Intrusion Detection System (HIDS); Signature-based Intrusion Detection System (SIDS); Anomaly-based Intrusion Detection System (AIDS); Algorithms; Machine Learning.

Subject

Computer Science and Mathematics, Probability and Statistics

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.