2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) 2017
DOI: 10.1109/iscisc.2017.8488375
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Intrusion Detection: Combining Decision Tree and Gaussian Mixture Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Lekha et al [8] propose a method to create rules and classify known attacks using CART, it uses an Extreme Learning Machine (ELM) for the classification of normal and abnormal activities. Bitaab et al [9] propose a method to do misuse detection based on DT and anomaly detection based on a Gaussian Mixture Model for classification of normal and unknown attacks. Al-Yaseen et al [10] propose an intrusion detection system based on SVM and ELM.…”
Section: Hybrid Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Lekha et al [8] propose a method to create rules and classify known attacks using CART, it uses an Extreme Learning Machine (ELM) for the classification of normal and abnormal activities. Bitaab et al [9] propose a method to do misuse detection based on DT and anomaly detection based on a Gaussian Mixture Model for classification of normal and unknown attacks. Al-Yaseen et al [10] propose an intrusion detection system based on SVM and ELM.…”
Section: Hybrid Intrusion Detectionmentioning
confidence: 99%
“…A hybrid intrusion detection system is designed to overcome the problem of excessive false alarms about attacks in anomaly detection and the disadvantage of detecting only known attacks in misuse detection. Also, ML and DM are applied for the detection of unknown attacks [3,[5][6][7][8][9][10]. However, these methods are also difficult to detect hidden attacks such as attacks like normal or unknown attacks similar to known attacks.…”
Section: Introductionmentioning
confidence: 99%
“…This means that an IDS leveraging only Decision Trees cannot identify patterns in packets exchanged by the hosts, which prevents the IDS to detect a wide variety of potentially malicious messages. For this reason Decision Trees are not well suited for identify zero-day attacks and performing anomaly detection, although some literature leveraged Decision Trees enhanced with other ML technique [98], [99], [100]. Malik et al [101] proposed an Intrusion Detection System based on Decision Trees with a technique based on Particle Swarm Optimization (PSO) to prune the tree.…”
Section: Decision Treementioning
confidence: 99%
“…The KDD99 and NSL-KDD datasets have also been used to test a variety of non neural-based techniques such as Support Vector Machine [29]- [33], Principal Component Analysis [34]- [38], Decision Trees [39]- [42], [42], [43], and various unsupervised approaches [44]- [49].…”
Section: Related Work On ML Techniques Applied To Network Intrusion D...mentioning
confidence: 99%