RESEARCH JOURNAL OF PURE SCIENCE AND TECHNOLOGY (RJPST )

E-ISSN 2579-0536
P-ISSN 2695-2696
VOL. 7 NO. 2 2024
DOI: https://doi.org/10.56201/rjpst.v7.no2.2024.pg50.69


Comprehensive Impact Assessment of Intrusion Detection and Mitigation Strategies Using Support Vector Machine Classification

Oscar Ebong, Anthony Edet, Anietie Uwah, Ndueso Udoetor


Abstract


Cybersecurity remains a paramount concern in today's interconnected digital space, necessitating continual evaluation and refinement of intrusion detection and mitigation strategies. This study presents a comprehensive impact assessment of various intrusion detection and mitigation methods, adopting Support Vector Machine (SVM) classification for analysis. Through critical examination of diverse techniques, including signature-based, behavior-based, and anomaly-based approaches, the research evaluates their effectiveness in combating cyber threats. Notably, SVM classification achieves an accuracy score of 87%, revealing its utility in discerning subtle patterns indicative of malicious activity. Furthermore, the study highlights the significance of proactive measures such as user training, network segmentation, and multi-factor authentication in fortifying defense mechanisms. By providing valuable insights into the strengths and limitations of different approaches, this work contributes to the ongoing efforts to safeguard digital ecosystems against evolving cyber threats.


keywords:

Intrusion, SVM, Cyber threats, Network, Mitigation Strategy


References:


Kumar, S. Gupta and S. Arora, "Research Trends in Network-Based Intrusion Detection
Systems: A Review," in IEEE Access, vol. 9, pp. 157761-157779, 2021, doi:
10.1109/ACCESS.2021.3129775.
Elijah M. Maseno, Zenghui Wang, and Hongyan Xing (2022). A Systematic Review on Hybrid
Intrusion
Detection
System.
Security
and
Communication
Networks. https://doi.org/10.1155/2022/9663052

Abdulganiyu, O.H., Ait Tchakoucht, T. & Saheed, Y.K. A systematic literature review for
network intrusion detection system (IDS). Int. J. Inf. Secur. 22, 1125–1162 (2023).
https://doi.org/10.1007/s10207-023-00682-2


DOWNLOAD PDF

Back