2020
DOI: 10.1016/j.procs.2020.03.367
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
68
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 160 publications
(68 citation statements)
references
References 8 publications
0
68
0
Order By: Relevance
“…However in some sense we might list the well performing algorithms in their suitable use-cases with the best result such as SVM, Decision Tree, Naïve Bayesian classifier. For the intrusion detection task can be presented the comparisons between classifiers and deep learning model [ 6 ]. Figure 8 shows the ROC curves of the Decision Tree, SVM and Naïve Bayesian classifier.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…However in some sense we might list the well performing algorithms in their suitable use-cases with the best result such as SVM, Decision Tree, Naïve Bayesian classifier. For the intrusion detection task can be presented the comparisons between classifiers and deep learning model [ 6 ]. Figure 8 shows the ROC curves of the Decision Tree, SVM and Naïve Bayesian classifier.…”
Section: Resultsmentioning
confidence: 99%
“…Common machine learning algorithms are Support Vector Machine (SVM) [ 8 , 23 , 28 ]. Naïve-Bayes classifier [ 12 , 27 ], K-nearest neighbor (KNN) [ 17 , 40 ], artificial neural network (ANN) [ 16 , 18 , 19 ], deep neural network (DNN) [ 6 ], and so on. Figure 3 shows how to select the best features by permutation feature importance.…”
Section: Intrusion Detection System For Multimedia Platformmentioning
confidence: 99%
“…In the training stage, the Validation is used by the DBN for verification, and the error is calculated by the loss function after the validation. In the verification stage, the 6-step verification method and training accuracy limitation method described in the reference [47] are used to evaluate the training results, which is followed by the testing stage. The experimental results in Table 4 and Fig.…”
Section: A Experimental Parameter Settingmentioning
confidence: 99%
“…In [ 86 ], the authors proposed a multi-variate analysis of correlations to extract geometric correlations between network traffic elements for DoS attack detection. In contrast to the closest triangular-zone neighbour solution utilizing the KDDCup99 datasets [ 87 ], this scheme raises the detection accuracy by 3%.…”
Section: Taxonomy Of Ml-based Aa For Iotmentioning
confidence: 99%