2022
DOI: 10.1016/j.tcs.2022.07.030
|View full text |Cite
|
Sign up to set email alerts
|

An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…Even Mhawi et al [24] have obtained an accuracy of nearly 99% on the CIC-IDS 2017 dataset, but their model uses 30 attributes which is more when compared to our proposed model. Moreover, Kannari et al [20] attained an accuracy of nearly 99% on the NSL-KDD dataset, but compared with our proposed model, the training time and the number of features are more for their models. Compared to earlier techniques, our suggested method outperforms the others since most solutions did not address the class imbalance.…”
Section: Comparative Analysismentioning
confidence: 84%
See 2 more Smart Citations
“…Even Mhawi et al [24] have obtained an accuracy of nearly 99% on the CIC-IDS 2017 dataset, but their model uses 30 attributes which is more when compared to our proposed model. Moreover, Kannari et al [20] attained an accuracy of nearly 99% on the NSL-KDD dataset, but compared with our proposed model, the training time and the number of features are more for their models. Compared to earlier techniques, our suggested method outperforms the others since most solutions did not address the class imbalance.…”
Section: Comparative Analysismentioning
confidence: 84%
“…Kannari et al [20] proposed an IDS to reduce the detection model computation time and resource usage. Initially, they used recursive feature elimination to remove the irrelevant features, and they selected 21 most essential attributes out of 42 of the NSL-KDD Dataset.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Raddy et al [10] have proposed a multiclass random forest technique for anomaly detection in resource-constrained IoT environments that is also very effective on streaming data. They have stated that the ensemble random forest technique is based on a multiclass algorithm and is very effective in handling streams of data, including the preprocessing stage.…”
Section: Background Studies -A Thorough Investigationmentioning
confidence: 99%
“…The experimental results showed that the hybrid dimensionality reduction method is better than the single algorithm and can effectively identify abnormal traffic. Phanindra et al [7] used recursive feature elimination techniques to rank features according to their importance and used stochastic forest algorithms to classify attacks. Su et al [8] studied the characteristics of abnormal behavior of network traffic, used hierarchical clustering method to sample traffic data, and then used support vector machine (SVM) to detect anomalies.…”
Section: Introductionmentioning
confidence: 99%