2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distribu 2017
DOI: 10.1109/snpd.2017.8022711
|View full text |Cite
|
Sign up to set email alerts
|

An analysis of random forest algorithm based network intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 36 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…These are findings that were replicated by our own initial tests. Additionally, there are many examples of current intrusion detection research also utilising RF such as [31] and [32].…”
Section: Stacked Non-symmetric Deep Auto-encodersmentioning
confidence: 99%
“…These are findings that were replicated by our own initial tests. Additionally, there are many examples of current intrusion detection research also utilising RF such as [31] and [32].…”
Section: Stacked Non-symmetric Deep Auto-encodersmentioning
confidence: 99%
“…Aung et al. [ 25 ] proposed a hybrid IDS method based on k-means and RF algorithms on the KDD’99 dataset, with the results indicating a high-performance accuracy and low model training time. Another study [ 26 ] used the RF model and adapted it to the Apache Spark distributed processing system to realize real-time detection with satisfactory efficiency and accuracy compared to existing systems.…”
Section: Related Workmentioning
confidence: 99%
“…Yi Yi Aung et al [14] states the security of the computer system is of great importance, And in the last few years, there have seen an affected growth in the amount of intrusions that intrusion detection has become the dominant of current information security. Firewalls cannot provide complete protection.…”
Section: Literature Surveymentioning
confidence: 99%