2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV) 2021
DOI: 10.1109/icicv50876.2021.9388502
|View full text |Cite
|
Sign up to set email alerts
|

A Performance Comparison of Machine Learning Approaches on Intrusion Detection Dataset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Manvith et al [16] demonstrated the ability of ML techniques to identify various attacks to ensure network security. They analyzed and compared SVM, LR, and RF techniques to determine which one can be used to identify network attacks.…”
Section: Comparative Study Based On ML Classifiersmentioning
confidence: 99%
“…Manvith et al [16] demonstrated the ability of ML techniques to identify various attacks to ensure network security. They analyzed and compared SVM, LR, and RF techniques to determine which one can be used to identify network attacks.…”
Section: Comparative Study Based On ML Classifiersmentioning
confidence: 99%
“…The three fundamental security considerations identified in Ref. [11] are confidentiality, integrity, and availability. As identified in Refs.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, machine learning is devised for optimal resource allocations. 16,17 On the other hand, fewer resources are needed as it minimizes the cost of engaged resources. Thus, the allocation of resources is done using cloud-based software services, which needs to make a tradeoff between QoS and occupied resources cost.…”
Section: Introductionmentioning
confidence: 99%