2018 International Conference on Cyberworlds (CW) 2018
DOI: 10.1109/cw.2018.00064
|View full text |Cite
|
Sign up to set email alerts
|

A 3D Approach for the Visualization of Network Intrusion Detection Data

Abstract: With the increasing threat of cyber attacks, machine learning techniques have been researched extensively in the area of network intrusion detection. Such techniques can potentially provide a means for the real-time automated detection of attacks and abnormal traffic patterns. However, misclassification is a common problem in machine learning techniques for intrusion detection, and a lack of insight into why such misclassification occurs impedes the improvement of machine learning models. This paper presents a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(13 citation statements)
references
References 27 publications
3
10
0
Order By: Relevance
“…Hence, when examining certain areas of data in 3D space, this data can be inversed and examined in higher dimensional space. From the visualization results, we show that key visual features of the UNSW-NB15 datasets are comparable with those presented in related work [17]. Zong et al [17] showed that most generic attacks are visually clustered together in both the training and test sets.…”
Section: Results For the Unsw-nb15 Datasetsupporting
confidence: 74%
See 4 more Smart Citations
“…Hence, when examining certain areas of data in 3D space, this data can be inversed and examined in higher dimensional space. From the visualization results, we show that key visual features of the UNSW-NB15 datasets are comparable with those presented in related work [17]. Zong et al [17] showed that most generic attacks are visually clustered together in both the training and test sets.…”
Section: Results For the Unsw-nb15 Datasetsupporting
confidence: 74%
“…From the visualization results, we show that key visual features of the UNSW-NB15 datasets are comparable with those presented in related work [17]. Zong et al [17] showed that most generic attacks are visually clustered together in both the training and test sets. In addition, there are some clusters that contain only normal connections in both the training and test sets.…”
Section: Results For the Unsw-nb15 Datasetsupporting
confidence: 74%
See 3 more Smart Citations