2021
DOI: 10.1016/j.icte.2020.12.004
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
38
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(40 citation statements)
references
References 4 publications
1
38
0
1
Order By: Relevance
“…All classifiers except C5 were used in prior work reviewed in this study; in particular, C1, C2, C8, C9, and C10 are commonly used in IDS operating in a range of networked environments including CC [15,18,28,57,58]. Classifiers C4, C6, and C7 were considered by Maza and Touahria [15] for benchmarking the performance of their proposed multiobjective FS method; C4 was used in Step Description…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…All classifiers except C5 were used in prior work reviewed in this study; in particular, C1, C2, C8, C9, and C10 are commonly used in IDS operating in a range of networked environments including CC [15,18,28,57,58]. Classifiers C4, C6, and C7 were considered by Maza and Touahria [15] for benchmarking the performance of their proposed multiobjective FS method; C4 was used in Step Description…”
Section: Resultsmentioning
confidence: 99%
“…Output the final feature set in Array E as the ensemble features. [47,48,50], C6 was used in [24], and C7 was also used in [28]. Classifier C3 was used in [28] and is a preferred classifier for distributed processing environments similar to CC [59].…”
Section: Step 11mentioning
confidence: 99%
See 2 more Smart Citations
“…Many contributions have been made throughout this field of operational technologies by the process automation and control group in particular. CPS (Cyber-Physical Systems) is a term used to describe the mixture of computational, communication, and physical components [5] [6]. Cyber-Physical Systems CPS is a modeling tool that can be used to simulate a wide range of applications, including sophisticated critical infrastructures.…”
Section: Introductionmentioning
confidence: 99%