2023
DOI: 10.1109/access.2023.3289405
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach With ML Classifier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(6 citation statements)
references
References 56 publications
0
6
0
Order By: Relevance
“…Although the three references [68], [40], and [34] outperformed our approach in specific classes, overall, our approach performed better on other metrics. According to Figure 9, we have constructed Table 16 which presents the assessment norms for each type in the CIC-DDoS 2019 dataset.…”
Section: Experiments and Results Discussionmentioning
confidence: 84%
See 2 more Smart Citations
“…Although the three references [68], [40], and [34] outperformed our approach in specific classes, overall, our approach performed better on other metrics. According to Figure 9, we have constructed Table 16 which presents the assessment norms for each type in the CIC-DDoS 2019 dataset.…”
Section: Experiments and Results Discussionmentioning
confidence: 84%
“…[76], the "normal" class in works No. [86] and [34], and the "reconnaissance" and "analysis" classes in reference No. [34].…”
Section: Experiments and Results Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, to represent a more realistic network environment, a diverse dataset needed to be examined. Bakro et al [21] introduced a hybrid feature selection approach that combined filter techniques such as Particle Swarm Optimization (PSO), Chi-Square (CS), and Information Gain (IG). Combining each of these three techniques was a novel method that generated a more reliable process of feature selection by using every technique's strength to increase the possibilities of selecting the most associated features.…”
Section: Literature Surveymentioning
confidence: 99%
“…This reflects the traffic compositions and online intrusions of a particular time, which can be reproducible, modified, and extensible. To be able to do this, training a deep learning model to identify anomalies from a given dataset is one of the initial stages of data preprocessing which we will be looking at in the preceding sections (Alabrah, 2023;Bakro et al, 2023). Anomaly-based systems are the most effective IDSs, due to the application of machine learning algorithms embedded within the system.…”
Section: Literature Reviewmentioning
confidence: 99%