2007 International Conference on Machine Learning and Cybernetics 2007
DOI: 10.1109/icmlc.2007.4370708
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Intrusion Detection Model Based on Fast Inductive Learning

Abstract: In recent years, intelligent intrusion detection techniques based on machine learning have been the research spots in the field of intrusion detection. Whereas, as network traffic and network scale increase continually, some current machine learning algorithms can't meet the requirement of the network intrusion detection models for efficiency and accuracy, which restricts the application of machine learning into intrusion detection. In order to enhance the availability and practicality of intelligent intrusion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Various researchers have given the following definitions on matter intrusion detection systems and technology in recent years. According to Yang and others [10], IDS is a system that detects and identifies intrusion behavior or intrusion enterprises by monitoring and analyzing Ag packets or system audit records in a computer system and then giving real-time intrusion warnings to system administrators.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Various researchers have given the following definitions on matter intrusion detection systems and technology in recent years. According to Yang and others [10], IDS is a system that detects and identifies intrusion behavior or intrusion enterprises by monitoring and analyzing Ag packets or system audit records in a computer system and then giving real-time intrusion warnings to system administrators.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to the attack detection technique, some studies assumed that they are in systems that detect identification/hybrid attacks, a mixture of misuse and abnormality models, as an additional category [14,15]. Also, detection of abnormality attacks can be decomposed by statistical abnormality test, artificial neural networks, full based on the detection of abnormality, data mining based on the detection of anomalies, immune-based abnormalities detection, and so on [10,16].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Research on anomaly, host-based intrusion detection has adopted either of three main approaches: system-based, specification-based, and learningbased [11]. Existing anomaly detection methods are primarily categorized as statistical anomaly detection, anomaly detection based on neural network and anomaly detection based on data mining, etc [12]. Currently many IDS are rule-based system where the performances highly rely on the rules identified by security experts.…”
Section: Introductionmentioning
confidence: 99%