2014
DOI: 10.1016/j.eswa.2013.08.066
|View full text |Cite
|
Sign up to set email alerts
|

A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
186
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 417 publications
(186 citation statements)
references
References 11 publications
0
186
0
Order By: Relevance
“…The algorithm first according to the data object plus or minus the number of data points difference within half a neighborhood to calculating the boundary of points, and then the boundary is greater than the boundary degrees threshold  marked point boundary point. Because of the cluster boundary point forward neighborhood and negative half neighborhood point number differs greatly, two minutes boundary is high, and the clustering internal points/noise isolation of plus or minus half the number of neighborhood points within the difference is not big, small border degree, so the algorithm can contain data sets general boundary point and noise point/distinguish isolated point [1].…”
Section: Boundary Point Detection Algorithm Based On Densitymentioning
confidence: 99%
“…The algorithm first according to the data object plus or minus the number of data points difference within half a neighborhood to calculating the boundary of points, and then the boundary is greater than the boundary degrees threshold  marked point boundary point. Because of the cluster boundary point forward neighborhood and negative half neighborhood point number differs greatly, two minutes boundary is high, and the clustering internal points/noise isolation of plus or minus half the number of neighborhood points within the difference is not big, small border degree, so the algorithm can contain data sets general boundary point and noise point/distinguish isolated point [1].…”
Section: Boundary Point Detection Algorithm Based On Densitymentioning
confidence: 99%
“…Kim et al [4] proposed a new hybrid intrusion detection model that integrates both misuse and anomaly detection model hierarchically. They decomposed the normal data into smaller subsets using misuse detection model.…”
Section: Related Workmentioning
confidence: 99%
“…For example, through the network layer of the IP package, the link layer data frame, etc. Data preprocessing is mainly to collect the network data pretreatment to make it standardized, it is transformed into a suitable data format, and the data to feature selection, filtering noise, filtering and other operations [1].The project team uses the classic KDD Cup 1999 data set to do validation experiments.…”
Section: Data Processingmentioning
confidence: 99%