2013
DOI: 10.1007/s10489-013-0452-6
|View full text |Cite
|
Sign up to set email alerts
|

A distance sum-based hybrid method for intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 60 publications
(23 citation statements)
references
References 30 publications
0
23
0
Order By: Relevance
“…As the results shows, the finding of this study, using the most used machine learning methods, the full data set, and comparing the classifiers with respect to binary and hardware criteria, can be a reference study for further studies in IDS or similar large datasets. (Zeng et al, 2011;Gowrison et al, 2013) BayesNet (Nguyen and Choi, 2008) MLP (Gowrison et al, 2013;Sheikhan and Sharifi Rad, 2013) OneR (Nguyen and Choi, 2008) Decision Tree (Nguyen and Choi, 2008;Sindhu et al, 2012;Guo et al, 2014;Khor et al, 2012;Lin et al, 2012;Benferhat et al, 2013) Decision Table (Nguyen and Choi, 2008) RBF Naive Bayes (Guo et al, 2014;Nguyen and Choi, 2008;Zeng et al, 2011;Benferhat et al, 2013) Decision Tree (Nguyen and Choi, 2008;Sindhu et al, 2012;Guo et al, 2014;Khor et al, 2012;Lin et al, 2012;Benferhat et al, 2013) SVM (Chung and Wahid, 2012;Lin et al, 2012;Guo et al, 2014) Random Forest (Zhang et al, 2008;Sindhu et al, 2012) Logistic Regression (Nguyen and Choi, 2008) NA 0.9999 ↑ 0.9470 ↑ J48 0.9885 (Lin et al, 2012) 0.9401 (Benferhat et al, 2013) 1.0000 ↑ 0.9349 ↓ Logistic Regression NA NA 0.9948 0.8152 MLP 0.9390…”
Section: Resultsmentioning
confidence: 99%
“…As the results shows, the finding of this study, using the most used machine learning methods, the full data set, and comparing the classifiers with respect to binary and hardware criteria, can be a reference study for further studies in IDS or similar large datasets. (Zeng et al, 2011;Gowrison et al, 2013) BayesNet (Nguyen and Choi, 2008) MLP (Gowrison et al, 2013;Sheikhan and Sharifi Rad, 2013) OneR (Nguyen and Choi, 2008) Decision Tree (Nguyen and Choi, 2008;Sindhu et al, 2012;Guo et al, 2014;Khor et al, 2012;Lin et al, 2012;Benferhat et al, 2013) Decision Table (Nguyen and Choi, 2008) RBF Naive Bayes (Guo et al, 2014;Nguyen and Choi, 2008;Zeng et al, 2011;Benferhat et al, 2013) Decision Tree (Nguyen and Choi, 2008;Sindhu et al, 2012;Guo et al, 2014;Khor et al, 2012;Lin et al, 2012;Benferhat et al, 2013) SVM (Chung and Wahid, 2012;Lin et al, 2012;Guo et al, 2014) Random Forest (Zhang et al, 2008;Sindhu et al, 2012) Logistic Regression (Nguyen and Choi, 2008) NA 0.9999 ↑ 0.9470 ↑ J48 0.9885 (Lin et al, 2012) 0.9401 (Benferhat et al, 2013) 1.0000 ↑ 0.9349 ↓ Logistic Regression NA NA 0.9948 0.8152 MLP 0.9390…”
Section: Resultsmentioning
confidence: 99%
“…In some cases, there is considerable divergence from one test to another one. The obvious case is SVM, which incurred a training time of 267.22 s in and 4.231 s in . Therefore, this comparison is provided in Table just for reference.…”
Section: Resultsmentioning
confidence: 99%
“…Khor et al , proposed a hybrid classifier by cascading different machine learning techniques such as the Bayesian networks and C4.5 decision tree. Guo et al , proposed a hybrid learning method, named distance sum‐based SVM (DSSVM). In DSSVM, a distance sum is defined as a correlation between each data sample and cluster centers.…”
Section: Related Workmentioning
confidence: 99%
“…P2P traffic is a collection of 9206 flows' features that were extracted from traffic supplied by UNIBS [37] following the method of Peng et al [38]. Following the work of Guo et al [39], kddcup99 is a nine-dimensional dataset extracted from KDD Cup 1999 Data [40], which was used to build a network intrusion detector. Due to space limitation, thereafter, we use abbreviations in brackets for dataset with long name.…”
Section: Methodsmentioning
confidence: 99%