2022
DOI: 10.3390/electronics11193109
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Analysis of Data Streaming and Batch Learning Models for Network Intrusion Detection

Abstract: Network intrusion, such as denial of service, probing attacks, and phishing, comprises some of the complex threats that have put the online community at risk. The increase in the number of these attacks has given rise to a serious interest in the research community to curb the menace. One of the research efforts is to have an intrusion detection mechanism in place. Batch learning and data streaming are approaches used for processing the huge amount of data required for proper intrusion detection. Batch learnin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 45 publications
0
4
0
Order By: Relevance
“…However, in both situations, a minor change in the data might result in a significant change in the structure. A novel crime detection approach known as naive Bayes (NB) is used for crime prediction and analysis [32]- [34]. Comes [11] only had an accuracy rate of 66% in predicting crimes and did not take into account computing speed, resilience, or scalability which are also important.…”
Section: Crime Prediction Approaches (Cv ML Dl)mentioning
confidence: 99%
“…However, in both situations, a minor change in the data might result in a significant change in the structure. A novel crime detection approach known as naive Bayes (NB) is used for crime prediction and analysis [32]- [34]. Comes [11] only had an accuracy rate of 66% in predicting crimes and did not take into account computing speed, resilience, or scalability which are also important.…”
Section: Crime Prediction Approaches (Cv ML Dl)mentioning
confidence: 99%
“…The authors of [11] conduct a comparison study between batch data mining algorithms (decision tree (J48) and projective adaptive resonance theory (PART)) and stream data mining algorithms (Hoeffding tree (HT) and OzaBagAdwin (OBA)). The dataset UNSW-NB15, which includes examples of normal activity and nine different kinds of intrusion network attacks, is used.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, these models are facing the ransomware attacks' rapid evolution. In addition to maintaining high accuracy levels, stream data mining techniques [10,11] can minimize model latency.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, Incremental learning approaches [10], [11] have gained significant attention in the field of intrusion detection due to their ability to learn and adapt continuously without the need for a complete and ready-to-go dataset [12]. These approaches allow models to be trained and launched with limited initial data and can continue to learn and update as new data becomes available.…”
mentioning
confidence: 99%