2018
DOI: 10.1016/j.procs.2018.10.416
|View full text |Cite
|
Sign up to set email alerts
|

A Network Intrusion Detection System Based On Ensemble CVM Using Efficient Feature Selection Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…The proposed method ranks feature according to their correlation and information gain. The features selected are collective with a device; therefore, the unique features are involved, and redundant features are rejected [3]. After preprocessing of data based on utilization of machine learning algorithm, this helps in intrusion detection system capable of reading the incoming data, classify them as per whether they are threatening or non-threatening.…”
Section: Application Protocol-based Intrusion Detection Systems (Apids)mentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed method ranks feature according to their correlation and information gain. The features selected are collective with a device; therefore, the unique features are involved, and redundant features are rejected [3]. After preprocessing of data based on utilization of machine learning algorithm, this helps in intrusion detection system capable of reading the incoming data, classify them as per whether they are threatening or non-threatening.…”
Section: Application Protocol-based Intrusion Detection Systems (Apids)mentioning
confidence: 99%
“…This method consumes the performance of average class values is more minor. Divyasree et al [3], a system to ensemble core vector machine (CVM) was proposed as an efficient intrusion detection system. The Chi-Square test is used in this approach to select the relevant features for each attack.…”
Section: Literature Surveymentioning
confidence: 99%
“…Divyasree and Sherly [42] proposed an effective IDS utilizing ensemble core vector machine (CVM) approach. CVMs are algorithms which work based on the idea of Minimum Enclosing Ball.…”
Section: Related Workmentioning
confidence: 99%
“…In general, the IDS are divided into misuse detection systems where the detection is based upon the signature and anomaly detection systems where the detection is based on profile [11,12]. In Anomaly detection systems there is a variation in ordinary system profile which is the main goal of this method, but in misuse detection systems, the main goal is to match with the attack case [13,14]. The fake alarm rate is normally high in anomaly detection systems because it is used to identify unfamiliar attacks having high-performance rates.…”
Section: Introductionmentioning
confidence: 99%