2020
DOI: 10.1007/s12083-019-00822-3
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced intrusion detection system via agent clustering and classification based on outlier detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…Sandosh et al 33 have proposed an enhanced intrusion detection system via agent clustering and classification based on outlier detection (EIDS‐ACC‐OD). The preprocessing is done before removing the unwanted spots using external detection.…”
Section: Problem Methodology and System Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Sandosh et al 33 have proposed an enhanced intrusion detection system via agent clustering and classification based on outlier detection (EIDS‐ACC‐OD). The preprocessing is done before removing the unwanted spots using external detection.…”
Section: Problem Methodology and System Architecturementioning
confidence: 99%
“…The results of EIDS-ACC-OD technique showed the accuracy, precision, recall, specificity, F1-score, false positive ratio (FRT), and false negative ratio (FNR). From the review, [21][22][23][24][25][26][27][28][29][30][31][32][33] with the increased use of the Internet and the services it provides, there has been an increase in cyber attacks for the use of information. Cloud computing is a technology used to store and maintain user information due to its simplicity and low budget services.…”
Section: Research Gapmentioning
confidence: 99%
“…Once calculated, these two distances are summed, and the obtained one‐dimensional distance is used to represent each data instance for intrusion detection by the KNN classifier. Sandoshet al 102 proposed the EIDS‐ACC‐OD, a new IDS via an agent clustering and classification based on Outlier Detection. The KDD CUP 99 was used to test the proposed model.…”
Section: Anomaly‐based Intrusion Detection Techniquesmentioning
confidence: 99%
“…Therefore, it is necessary to detect both outliers for building an intrusion detection system for practical domains. However, most previous studies have focused on detecting point outliers [6,20].…”
Section: Introductionmentioning
confidence: 99%