2020
DOI: 10.1002/dac.4689
|View full text |Cite
|
Sign up to set email alerts
|

Design network intrusion detection system using support vector machine

Abstract: Summary The growing use of the Internet and the existence of vulnerable points in networks have made the usage of intrusion detection systems as one of the most important security elements. This study aimed to present a method to design an analytical framework of detecting destructive data with respect to three factors including time, users' information, and scale. The design can be applied for big data. In the proposed method, to train data, the time has been divided into subperiods exploiting users' review i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…The experimental results proved that the proposed RPSO-logistic regression technique outperforms the standard regression and backpropagation (BP) neural network models. Ajdani et al [ 25 ] in another research proposed an analytical framework that is suitable for high-scale data. The VirusTotal dataset has been applied including 2.5 M scans of 30 months (from 2012 to 2015), which represents a huge amount of data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The experimental results proved that the proposed RPSO-logistic regression technique outperforms the standard regression and backpropagation (BP) neural network models. Ajdani et al [ 25 ] in another research proposed an analytical framework that is suitable for high-scale data. The VirusTotal dataset has been applied including 2.5 M scans of 30 months (from 2012 to 2015), which represents a huge amount of data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the second phase, the hybrid approach is done with data processing, cleaned, and given input to machine learning classifiers such as logistic regression and target is considered when both approaches are termed as malicious. It will be less inaccurate in the dynamic analysis [19]. In StormDroid [20] features collected from sensitive permissions like Short Messaging Service (SMS), intent filters tec.…”
Section: Hybrid Analysismentioning
confidence: 99%
“…Su [15] applied the Attention method in the Bidirectional LSTM model to perform forward and backward LSTM to extract features for the intrusion detection system. However, the BAT-MC algorithm in the developed model failed to utilize the tools effectively resulting in poorer results.…”
Section: Literature Reviewmentioning
confidence: 99%