2017
DOI: 10.1016/j.knosys.2017.07.005
|View full text |Cite
|
Sign up to set email alerts
|

An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 201 publications
(46 citation statements)
references
References 31 publications
0
46
0
Order By: Relevance
“…Challenge 1: Supervised vs unsupervised Learning: Recently, there have been studies where supervised machine learning is used for attack detection [7,14,[25][26][27]. Although these models possess a high detection rate and generate few false alarms for known attacks, they fail to detect the unknown or new attacks due to the lack of signatures.…”
Section: Challenges: Model Creationmentioning
confidence: 99%
“…Challenge 1: Supervised vs unsupervised Learning: Recently, there have been studies where supervised machine learning is used for attack detection [7,14,[25][26][27]. Although these models possess a high detection rate and generate few false alarms for known attacks, they fail to detect the unknown or new attacks due to the lack of signatures.…”
Section: Challenges: Model Creationmentioning
confidence: 99%
“…Attack categories conclude Fuzzers, Analysis, Backdoor, DoS, Exploit, Generic, Reconnaissance, Shellcode, and Worm. 7, dbytes (8), rate(9), sttl (10), dttl (11), sload (12), dload (13), sloss (14), dloss (15) Content features swin (16), dwin (17), stcpb (18), dtcpb (19), smean (20), dmean (21), trans_depth (22), res_bdy_len(23) Time features sintpkt (24), dintpkt (25), sjit (26), djit (27), tcprtt (28), synack (29), ackdat (30) Addition features ct_srv_src (31), ct_state_ttl(32), ct_dst_ltm (33), ct_src_dport_ltm(34), ct_dst_sport_ltm (35), ct_dst_src_ltm (36), is_ftp_login (37), ct_ftp_cmd (38), ct_flw_http_mthd(39), ct_src_ltm(40),ct_srv_dst(41),is_sm_ips_ports(42)…”
Section: Network Traffic Datasetsmentioning
confidence: 99%
“…In addition to recall rate mentioned above, Acc(Accuracy), DR(Detection rate) and FAR(False alarm rate) are also adopted as evaluation indexes of anomaly detection methods [36].…”
Section: Experimental Evaluation Indexmentioning
confidence: 99%
“…In Ref. [17], they presented an intrusion detection technology using the Hypergraph based Genetic algorithm for parameter setting and feature selection in SVM. It used the superior properties of hypergraphs to generate initial populations to ensure the search for optimal solutions, and provided a weighted objective function to maintain the Trade-offs among the maximum detection rate, the minimum false alarm rate, and the number of optimal features.…”
Section: Ids Of Combining Svm With Other Intelligentmentioning
confidence: 99%