2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2018
DOI: 10.1109/smc.2018.00719
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Machine Learning Algorithms for Detection of Network Intrusions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Li et al [27] applied recurrent neural network and BLS learning algorithms to classify known network intrusions. Experimental results indicate that BLS achieved comparable performance and shorter training time because of their wide and deep structure.…”
Section: Nids Based On Blsmentioning
confidence: 99%
“…Li et al [27] applied recurrent neural network and BLS learning algorithms to classify known network intrusions. Experimental results indicate that BLS achieved comparable performance and shorter training time because of their wide and deep structure.…”
Section: Nids Based On Blsmentioning
confidence: 99%
“…For both of the datasets, BGRU+MLP provides the highest detection rate of 99.84% and 99.24%, respectively. Li et al [24] implemented LSTM, GRU, Bi-LSTM, and Broad Learning System (BLS) algorithms on the NSL-KDD dataset for various known intrusion classification. The performance analysis determines that the BLS reduces the model training time with an overall accuracy of 84.15% and 72.64%, corresponding to KDDTest+ and KDDTest-21 datasets.…”
Section: State-of-the-artmentioning
confidence: 99%
“…Rapid developments in the field of artificial intelligence and deep learning have led to a wide variety of algorithms capable of detecting anomalies in the flow of network traffic and even classify certain attacks present within those network flows. Proposed algorithms in the literature include recurrent neural networks (RNNs) [8], convolutional neural networks (CNNs) [12] [7], support-vector machines (SVNs) [17] and broad learning systems (BLSs) [13] [9]. An additional challenge, that all of those approaches have in common, is the fact that network attacks are ordinarily rather rare events and that undetected attacks can lead to great costs.…”
Section: Introductionmentioning
confidence: 99%