2014
DOI: 10.2991/ijndc.2014.2.2.2
|View full text |Cite
|
Sign up to set email alerts
|

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework

Abstract: Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources. The fact is that no single classifier is able to give maximum accuracy for all the five classes (Normal, Probe, DOS, U2R and R2L). We have proposed a Cyber Attack Detection System (CADS) and its generic framework, which performs well for all the classes. This is based on Generalized… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…It's crucial to remember that this is not a comprehensive list and that the threat environment is always changing. To protect themselves from these constantly evolving cyber risks, businesses and individuals must exercise vigilance, keep their systems and software up to date, and put strong security measures in place [5].…”
Section: A Cyber Attacks and Techniquesmentioning
confidence: 99%
“…It's crucial to remember that this is not a comprehensive list and that the threat environment is always changing. To protect themselves from these constantly evolving cyber risks, businesses and individuals must exercise vigilance, keep their systems and software up to date, and put strong security measures in place [5].…”
Section: A Cyber Attacks and Techniquesmentioning
confidence: 99%
“…The gain ratio is then used in calculating the attribute farthest from a gain ratio of zero (and thus most useful for classification), and is implicitly used as a similarity measure. Wang et al [51] and Singh and Silakari [50] use raw KLD to determine the features selected: features with high values of KLD are retained. In all three examples KLD is used as a basic measure of similarity with a threshold set by the research used to determine the gain.…”
Section: A Measure Definedmentioning
confidence: 99%
“…Devarakonda et al [33] use the k-nearest neighbor method of clustering as one of many in a voting ensemble. Singh and Silakari [50] also make use of k-nearest neighbor as the classification method. The use of distance is in the context of the k-nearest neighbor classifier, and authors specify the use of Euclidean distance, but note that other distances (such as the Manhattan distance) could be used instead.…”
Section: A Measure Definedmentioning
confidence: 99%