Affiliation:
1. İSTANBUL TEKNİK ÜNİVERSİTESİ
Abstract
With the widespread use of technology, it has been observed that there are multiple connection points to the internet and other networks, and threats from different channels have increased. In existing systems, the inadequacy of firewall and encryption techniques used to detect and eliminate threats has led to the use of different detection and prevention systems in existing network systems, and Intrusion Detection Systems have been designed based on this need. Signature and anomaly- based Intrusion Detection Systems, which we can call traditional, have remained stagnant in the face of changing and developing technological developments, it has gained importance to switch to a system that can work more instantaneously, can detect attacks faster and at higher rates, and where the human factor is less. It has been inevitable for intelligence technologies to take an active role in the design of Intrusion Detection systems.
Reference17 articles.
1. Alazab, A., Hobbs, M., Abawajy, J., & Alazab, M. (2012). Using feature selection for intrusion detection system. In 2012 international symposium on communications and information technologies (ISCIT) (pp. 296-301). IEEE.
2. Anonim (2020). Cyber Security Technology. https://securelist.com/cyberthreats-on lockdown/96988. Arıcı, N., & Yıldız, E. (2010). Gerçek Zamanlı Bir Saldırı Tespit Sistemi Tasarımı Ve Gerçekleştirimi. E-Journal of New World Sciences Academy Engineering Sciences, 5(2).
3. Dilek, S., Çakır, H., & Aydın, M. (2015). Applications of artificial intelligence techniques to combating cyber crimes: A review. arXiv preprint arXiv:1502.03552.
4. Farid, D. M., & Rahman, M. Z. (2010). Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm. J. Comput., 5(1), 23-31.
5. Frank, J. (1994). Artificial Intelligence and Intrusion Detection: Current and Future Directions.