2021
DOI: 10.1007/s11277-021-08353-y
|View full text |Cite
|
Sign up to set email alerts
|

Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Analysis of network data for the purpose of supporting an anomaly-based IDS has been a topic of interest for some time [ 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ]. The first widely studied network dataset was the KDD99Cup dataset, analyzed in [ 10 , 12 , 15 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Analysis of network data for the purpose of supporting an anomaly-based IDS has been a topic of interest for some time [ 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ]. The first widely studied network dataset was the KDD99Cup dataset, analyzed in [ 10 , 12 , 15 ].…”
Section: Related Workmentioning
confidence: 99%
“…Other studies, such as [ 14 ], used data that are not made publicly available. They applied a multilayer SVM to their data to support a block lowest common ancestor algorithm to cluster network intrusion features.…”
Section: Related Workmentioning
confidence: 99%
“…Many studies have been performed on identifying attack network traffic after the attacks have happened [2][3][4][5], but in this work we are trying to study the step before that, that is, who is trying to gather information about our system so that they can perform an attack. Hence, our aim in this work is to analyze the Reconnaissance Tactic (TA0043) of the MITRE ATT&CK framework.…”
Section: Introductionmentioning
confidence: 99%
“…Many studies have been performed on identifying attack network traffic after the attacks have happened [2][3][4][5], but in this work we are trying to study the step before that-that is, identifying who is trying to gather information about our system so that they can perform an attack. Hence, our aim in this work is to analyze the Reconnaissance Tactic (TA0043) of the MITRE ATT&CK framework.…”
Section: Introductionmentioning
confidence: 99%