
The update procedure includes training new classifiers and adding them to the base ensemble model.

The proposed IDS employs the homogeneous ensemble method to create a model that can be periodically updated to detect novel attacks. Therefore, this study presents an adaptive IDS and a new real-world network dataset called the UKM-IDS20. Moreover, the connection between processing raw network data and creating an adaptive IDS has not been sufficiently studied in this domain. Updating the IDS datasets would allow for the testing of the proposed IDSs on datasets that are relevant to the recent attacks. In addition, consistent update of IDS datasets is essential due to the advancement in network technology and attack strategies. Therefore, an adaptive IDS is crucial to keep computer networks protected. Traditional network intrusion detection systems (IDSs) usually have difficulties detecting these attacks because they need to adapt to more advanced or challenging technologies of novel attacks, yet updating them can be computationally expensive and complicated. In recent years, the demand for computer networks has grown rapidly, thus allowing for higher risk of novel attack incidents. The purpose of this paper is to demonstrate how Wireshark is applied in network protocol diagnosis and can be used to find some basic indicators of compromise for a malware. It lets administrator to see what"s happening on network at a microscopic level. In this regard, Wireshark can be used in identifying and categorizing various types of attack signatures. Wireshark proves to be an effective open source tool in the study of network packets and their behavior. Packet analysis is typically performed using a packet sniffer, a tool used to capture raw network data going across the wire. This can be used to find traces of nefarious online behavior, data breaches, unauthorized website access, malware infection, and intrusion attempts, and to reconstruct image files, documents, email attachments, etc. Packet analysis is a primary trace back technique in network forensics, Packet analysis, often referred to as packet sniffing or protocol analysis, describes the process of capturing and interpreting live data as it flows across a network in order to better understand what is happening on that network.
