2014 IEEE International Conference on Data Mining Workshop 2014
DOI: 10.1109/icdmw.2014.147
|View full text |Cite
|
Sign up to set email alerts
|

A Collaborative and Adaptive Intrusion Detection Based on SVMs and Decision Trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Because IDS needs to be updated to adjust to the changing environment, the network's diverse and flexible nature significantly shortens the lifetime of detection models.Depending on unique expenses related to computation, money, and time, distributed, centralized, and hybrid approaches must be used.Because of the aforementioned difficulties, current conventional procedures are unable to attain the necessary high-level accuracy. A more through, detailed, and in-depth understanding of the types of intrusion occurrences is needed to guarantee the effectiveness of intrusion detection systems.Network intrusion detection systems have made extensive use of traditional machine learning techniques, including Bayesian [8][9][10], Support Vector Machines [11][12][13][14][15][16], Decision Trees [17][18][19], Logistic Regression [20][21][22][23], and others. These techniques have produced favorable results.…”
Section: Figure I General Architecture Of Industrial Control Systemmentioning
confidence: 99%
“…Because IDS needs to be updated to adjust to the changing environment, the network's diverse and flexible nature significantly shortens the lifetime of detection models.Depending on unique expenses related to computation, money, and time, distributed, centralized, and hybrid approaches must be used.Because of the aforementioned difficulties, current conventional procedures are unable to attain the necessary high-level accuracy. A more through, detailed, and in-depth understanding of the types of intrusion occurrences is needed to guarantee the effectiveness of intrusion detection systems.Network intrusion detection systems have made extensive use of traditional machine learning techniques, including Bayesian [8][9][10], Support Vector Machines [11][12][13][14][15][16], Decision Trees [17][18][19], Logistic Regression [20][21][22][23], and others. These techniques have produced favorable results.…”
Section: Figure I General Architecture Of Industrial Control Systemmentioning
confidence: 99%
“…The second technique leverages an Intrusion Detection and Prevention System (IDS/IPS) approach, utilizing the Decision Tree machine learning classification algorithm [30]. This method actively monitors the network for any signs of attacks, aiming to detect and mitigate threats in real-time.…”
Section: ░ 8 Conclusionmentioning
confidence: 99%
“…Traditional machine learning methods have been widely used in network intrusion detection systems, such as Bayesian [ 2 4 ], support vector machines [ 5 10 ], decision tree [ 11 13 ], logistic regression [ 14 – 16 ], and so on. They all have achieved good results.…”
Section: Introductionmentioning
confidence: 99%