Research Article

Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets

Table 1

The main differences between misuse and anomaly intrusion detection methods.

CriteriaMisuse detectionAnomaly detection

Basic principleUsing previously defined patterns/signatures/rules to detect intrusionEstablishes normal behavior profile and detects intrusion based on deviations from that profile
Detecting unknown attacksNoYes
Detecting known attacksVery goodGood
Rates of false positiveVery lowModerate to high (depends on many factors)
Constant update of the databaseYesNo
Suitable ML approachSupervised MLUnsupervised ML
Biggest challengeMaintaining an up-to-date database of all known attack signaturesDifferentiating normal from malicious behavior