Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Scientific Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Network Intrusion Detection System (NIDS)

Encyclopedia of Data Science and Machine Learning
A hardware device and/or software application designed to monitor a digital network for malicious activity, violations of network policies and recording network activities for analysis. NIDS systems typically record incoming network traffic, from the perspective of an enterprise host system. NIDS systems are traditionally sub-divided into classes, such as signature based (relying on specific, pre-defined patterns of network behaviors to identify specific malware events) and anomaly based systems. Anomaly based NIDS systems are intended to be more adaptable to previously unknown malware attacks because they are not limited to being pre-programmed for specific malware signatures, but are more challenging to develop.
Published in Chapter:
Malware Detection in Network Flows With Self-Supervised Deep Learning
Thomas Alan Woolman (On Target Technologies, Inc., USA) and Philip Lunsford (East Carolina University, USA)
Copyright: © 2023 |Pages: 18
DOI: 10.4018/978-1-7998-9220-5.ch139
Abstract
This article explores the application of anomaly detection models from network flow data using multi-layer perceptron autoencoding neural networks, for the purpose of self-supervised detection of novel network intrusion events and malware classes over unrestrained internet connections. The authors utilized network flows rather than more detailed (and larger) packet capture logs in order to create a more cost-effective and potentially faster anomaly detection tool that could more easily scale enterprise class network traffic analysis. Unsupervised/self-supervised deep learning anomaly detection was used against this less-granular dataset to maximize the likelihood of detecting novel network activities within the less-detailed dataset without relying on pre-defined rules and training data. The authors conclude with a test of statistical significance against known threat classes (unknown to the anomaly detection model) that the proposed methodology results were statistically significant for detecting threat classes in unrestrained internet networks using network flow data.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR