2015
DOI: 10.1016/j.eswa.2015.07.015
|View full text |Cite
|
Sign up to set email alerts
|

An intrusion detection system using network traffic profiling and online sequential extreme learning machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
91
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 232 publications
(91 citation statements)
references
References 18 publications
0
91
0
Order By: Relevance
“…In this paper [6], an author utilized The main learning algorithms, SVM, Bayes Naive, and J48, for feature categorization. In this paper [7], an author presented a technique based on the Online Sequential Extreme Learning Machine (OS-ELM). In this paper [8], an author presented a multilevel hybrid intrusion detection model using a combination of K-means, SVM, as well as ELM algorithms.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this paper [6], an author utilized The main learning algorithms, SVM, Bayes Naive, and J48, for feature categorization. In this paper [7], an author presented a technique based on the Online Sequential Extreme Learning Machine (OS-ELM). In this paper [8], an author presented a multilevel hybrid intrusion detection model using a combination of K-means, SVM, as well as ELM algorithms.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Sing et al [3] present an intrusion detection technique using network-traffic profiling and an extreme online sequential machine-learning algorithm. The proposed methodology uses one profiling procedure called alpha profiling that creates profiles on the basis of protocol and service features, and a second profiling process, beta profiling, where the alpha profiles are grouped to reduce the number of profiles.…”
Section: Related Workmentioning
confidence: 99%
“…Many authors have proposed using network profiles [3]- [5]. However, these works focus on the traffic at the border to build the profiles, losing visibility of internal attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, the performance of intrusion detection models is evaluated by five widely used measures: accuracy, precision, detection rate (DR), F1-score, and false alarm rate (FAR) [14,33,34]. The calculations of these evaluation measures are defined as follows: The accuracy and detection rates evaluate the capability of an intrusion detection model to correctly predict connections and detect abnormal events, respectively.…”
Section: Evaluation Criteriamentioning
confidence: 99%