2018
DOI: 10.1016/j.future.2017.09.056
|View full text |Cite
|
Sign up to set email alerts
|

Dendron : Genetic trees driven rule induction for network intrusion detection systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 104 publications
(55 citation statements)
references
References 25 publications
0
55
0
Order By: Relevance
“…In detail, anomaly detection is designed to detect malicious actions through identifying deviations from a normal profile behavior. Such IDSs perform better at detecting novel types of attacks, however, they could not avoid a high false positive (FP) rate [68]. On the other hand, based on known patterns, misuse detection can effectively distinguish legitimate instances from the malicious ones [46].…”
Section: Introductionmentioning
confidence: 99%
“…In detail, anomaly detection is designed to detect malicious actions through identifying deviations from a normal profile behavior. Such IDSs perform better at detecting novel types of attacks, however, they could not avoid a high false positive (FP) rate [68]. On the other hand, based on known patterns, misuse detection can effectively distinguish legitimate instances from the malicious ones [46].…”
Section: Introductionmentioning
confidence: 99%
“…Considering different types of attack, on average, we proposed method performs better than other considered methods. However, statistically the ranking of the proposed method is statistically undistinguishable from the methods of Zhao et al [45], Le et al [37], and Papamartzivanos et al [48]. Following the recommendation of Demšar [50], we used a series of statistical tests to compare the methods.…”
Section: Accuracymentioning
confidence: 99%
“…A hybrid deep learning-based anomaly detection scheme on software defined network [14] was proposed by Garg et al By using improved Restricted Boltzmann Machine (RBM), they reduced the dimension of the captured flow, then detected the intrusion with a gradient-based SVM. The Dendron [18] applied genetic trees driven rule induction for anomaly detection, where the decisions trees (DTs) were blended with evolutionary techniques to generate detection rules. These generated rules, which are linguistically interpretable for human comprehension, enabled the detector to take accurate decisions.…”
Section: Network Anomaly Detectionmentioning
confidence: 99%