2010
DOI: 10.1016/j.eswa.2010.02.102
|View full text |Cite
|
Sign up to set email alerts
|

A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
217
0
4

Year Published

2013
2013
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 428 publications
(232 citation statements)
references
References 12 publications
1
217
0
4
Order By: Relevance
“…This section considers a well-known real-world data set NSL-KDD-99 (Tavallaee et al (2009)), which has been widely used as a benchmark (Bostani and Sheikhan (2017) ;Wang et al (2010);Yang et al (2017b)). This data set is a modified version of KDD Cup 99 data set generated in a military network environment.…”
Section: Methodsmentioning
confidence: 99%
“…This section considers a well-known real-world data set NSL-KDD-99 (Tavallaee et al (2009)), which has been widely used as a benchmark (Bostani and Sheikhan (2017) ;Wang et al (2010);Yang et al (2017b)). This data set is a modified version of KDD Cup 99 data set generated in a military network environment.…”
Section: Methodsmentioning
confidence: 99%
“…In study of Wang et al (2010), the authors suggested a method which is based upon Artificial Neural Network and fuzzy clustering which according to them improves ANN-based IDS and aims to resolve the following two problems: i) less recognition accuracy ii)recognition stability. Their proposed method has the following three stages.…”
Section: Literature Reviewmentioning
confidence: 99%
“…have been used on KDD CUP 1999 data for Intrusion Detection [1][2][3][4][5][6][7][8][9][10], with neural networks as main tool in this type of problem. Different neural network algorithms have been used, including Grey Neural Networks [4], RBF [10,11] Recirculation Neural Networks [2], PCA [6,12] and MLP [5], with MLP generally showing better results than others [2].These works are mainly focusing on misuse detection.…”
Section: Related Workmentioning
confidence: 99%
“…It is therefore very important to reduce both types of these alarms, and the best way to do it is by combining anomaly and misuse detection [5,8].…”
Section: Introductionmentioning
confidence: 99%