2019 2nd International Conference on New Trends in Computing Sciences (ICTCS) 2019
DOI: 10.1109/ictcs.2019.8923043
|View full text |Cite
|
Sign up to set email alerts
|

Detecting network anomalies using machine learning and SNMP-MIB dataset with IP group

Abstract: SNMP-MIB is a widely used approach that uses machine learning to classify data and obtain results, but using SNMP-MIB huge dataset is not efficient and it is also time and resources consuming. In this paper, a REP Tree, J48(Decision Tree) and Random Forest classifiers were used to train a model that can detect the anomalies and predict the network attacks that my affect the Internet Protocol(IP) group. This trained model can be used in the devices that are used to detect the anomalies such as intrusion detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Based on the results of the study in Table 6, it is explained that the most dominant n-gram technique in detecting DDoS attacks is 2-Gram and 3-Gram and has the highest level of accuracy, reaching 99.98%. When compared with research, [25]- [27] it only got 98.7%, meaning that there was a significant difference reaching 1.28%. Visually it can be seen in Figure 4.…”
Section: Performance Comparisonmentioning
confidence: 78%
“…Based on the results of the study in Table 6, it is explained that the most dominant n-gram technique in detecting DDoS attacks is 2-Gram and 3-Gram and has the highest level of accuracy, reaching 99.98%. When compared with research, [25]- [27] it only got 98.7%, meaning that there was a significant difference reaching 1.28%. Visually it can be seen in Figure 4.…”
Section: Performance Comparisonmentioning
confidence: 78%
“…Manna and Alkasassbeh [15] presented a recent approach that used ML, such as decision tree J48, random forest, and REP tree. The proposed technique used SNMP-MIB data for the trained IDS system to detect DOS attack anomalies that may affect the network.…”
Section: Fig 1 Detection Frameworkmentioning
confidence: 99%
“…Kwon [20] Manna and Alkasassbeh [31] have introduced the latest ML method, such as the J48 decision tree, the random forest, and the REP tree. The proposed process used SNMP-MIB data for the IDS-trained system to detect DOS attacks that could affect the network.…”
Section: Literature Surveymentioning
confidence: 99%