Fifth Annual Conference on Communication Networks and Services Research (CNSR '07) 2007
DOI: 10.1109/cnsr.2007.22
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
27
0
1

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(29 citation statements)
references
References 3 publications
1
27
0
1
Order By: Relevance
“…The Random Forest algorithm is an ensemble of unpruned decision trees which tends to be more robust to noise in the training dataset being a very stable model builder. This was reported in other works such as [11]. The target is only to compare the results of applying a data mining algorithm to the datasets in order to discover the differences among the subsets of features.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The Random Forest algorithm is an ensemble of unpruned decision trees which tends to be more robust to noise in the training dataset being a very stable model builder. This was reported in other works such as [11]. The target is only to compare the results of applying a data mining algorithm to the datasets in order to discover the differences among the subsets of features.…”
Section: Methodsmentioning
confidence: 99%
“…In recent years, many data mining algorithms have been used against KDD'99 dataset in order to detect intrusion in network traffics however, many used small samples of KDD'99 dataset in their research [11,7,18,16,15,14,13]. In 2012, Zargari and Voorhis [10] found Random Forest algorithm to be producing the best detection rates against the Corrected KDD'99 dataset (includes 311027 instances) and proposed a subset of significant features using Weka.…”
Section: Methodsmentioning
confidence: 99%
“…Similarly, augmenting SVDDs with labeled data has been observed to greatly improve detection accuracy (Görnitz et al 2013). Other work has studied SVMs (Khan et al 2007;Li et al 2012) and other classification methods (Koc et al 2012;Peddabachigari et al 2007;Gharibian and Ghorbani 2007).…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…The experiments showed that the approach can reduce the time to build patterns and increase the detection rate of the minority intrusions. The results showed that the proposed approach provides better performance compared to the best results from the KDD99 contest [11]. An intrusion detection system based on neural networks has been presented in [12] [13].…”
Section: Related Workmentioning
confidence: 99%
“…We also use a Naive Bayesian algorithm as a classifier for filtering malicious contents. Indeed, the Naive Bayes classifier provides a simple approach, with clear semantics, for representing, using and learning probabilistic knowledge [11]. The goal is to accurately predict the class of test instances where the training instances include the class information.…”
Section: The Machine Learning Schemementioning
confidence: 99%