2017
DOI: 10.1007/978-3-319-59439-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
72
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 131 publications
(72 citation statements)
references
References 45 publications
0
72
0
Order By: Relevance
“…The results presented in table 2 show that the random forest Algorithm performed well in terms of overall accuracy and model precision. Though, it shows a [38] 92.29% 92.2% 0.41% -DMM [39] 97.8% 97.8% 2.5% -TANN [40] 96.91% 97.8% 2.5% -DBN [41] 97.45% --3.2 sec RNN [42] 99.53% 97.09% 3.6% 5516 sec DNN [43] 75.75% 75% 15% -E-DNN [44] 92.49% 98% 14.7% -DFF-NN [45] 98.6% 99% 1.8% 398 sec DL [46] 98% 71% --SVM-DR [46] 97 very low precision for U2R and R2L attacks. J48 detects attacks with very good accuracy and low missclassification rate (or CPE).…”
Section: ) Results Discussionmentioning
confidence: 95%
“…The results presented in table 2 show that the random forest Algorithm performed well in terms of overall accuracy and model precision. Though, it shows a [38] 92.29% 92.2% 0.41% -DMM [39] 97.8% 97.8% 2.5% -TANN [40] 96.91% 97.8% 2.5% -DBN [41] 97.45% --3.2 sec RNN [42] 99.53% 97.09% 3.6% 5516 sec DNN [43] 75.75% 75% 15% -E-DNN [44] 92.49% 98% 14.7% -DFF-NN [45] 98.6% 99% 1.8% 398 sec DL [46] 98% 71% --SVM-DR [46] 97 very low precision for U2R and R2L attacks. J48 detects attacks with very good accuracy and low missclassification rate (or CPE).…”
Section: ) Results Discussionmentioning
confidence: 95%
“…The method in [ 40 ] is based on a feed-forward neural network, with stochastic gradient descent back-propagation for training, yet with the addition of a deep auto-encoder to reduce dimensionality. The results are excellent when compared to the mixture approach presented in [ 31 ], and support vector machines or other deep learning approaches. However, this method uses all features of the data initially, and requires the complexity of neural networks and back-propagation.…”
Section: Introductionmentioning
confidence: 84%
“…Specifically in the context of computer security and intrusion detection, several recent works used the data set given in [ 30 ] (UNSW-NB15) together with novel techniques for parameter estimation. In [ 31 ], it was used successfully for intrusion detection. The decision engine in [ 31 ] assumes a Dirichlet mixture model for the multi-dimensional data (above 40 features per entry in the data set), and it is based on estimating its parameters at the learning phase.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For statistical learning, [15] suggests that using GMM to fit the dataset and identify any outliers may be an alternative option if the Gaussian distribution is not applicable for the data. And as [16] states that GMM can well define all the possible data points by assigning the probability rather than a cluster in the k-means algorithm.…”
Section: Gaussian Mixture Model (Gmm)mentioning
confidence: 99%