2022
DOI: 10.46519/ij3dptdi.1030539
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Evaluation of the Boosting Algorithms for Network Attack Classification

Abstract: The security of information resources is an extremely critical problem. The network infrastructure that enables internet access, in particular, may be targeted by attackers from a variety of national and international locations, resulting in losses for institutions that utilize it. Anomaly detection systems, sometimes called Intrusion Detection Systems (IDSs), are designed to identify abnormalities in such networks. The success of IDSs, however, is limited by the algorithms and learning capacity used in the ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 44 publications
0
1
0
Order By: Relevance
“…Unlike other tree-based models, LightGBM constructs decision trees by growing the leaves first, rather than growing the levels from the root, which accelerates the training process. It uses gradient-based one-side sampling and exclusive feature bundling to separate out the data instances for finding optimal split points and deal with excessive features [42], [43].…”
Section: Ensemble Methodsmentioning
confidence: 99%
“…Unlike other tree-based models, LightGBM constructs decision trees by growing the leaves first, rather than growing the levels from the root, which accelerates the training process. It uses gradient-based one-side sampling and exclusive feature bundling to separate out the data instances for finding optimal split points and deal with excessive features [42], [43].…”
Section: Ensemble Methodsmentioning
confidence: 99%