2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS) 2018
DOI: 10.1109/icis.2018.8466537
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Intrusion Detection System using K-means and K-Nearest Neighbors Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…Supervised learning methods are already specified with the class labels to verify model classification or predictions. K-nearest neighbours (KNN) method is the classification method used to classify the incoming entry as normal or malicious entry [50]. Naïve Bayes is a statistical method that uses a probabilistic method based on the Bayesian theory; the probability of a field prone to attack can be calculated [51].…”
Section: Artificial Intelligence For Cyber Securitymentioning
confidence: 99%
“…Supervised learning methods are already specified with the class labels to verify model classification or predictions. K-nearest neighbours (KNN) method is the classification method used to classify the incoming entry as normal or malicious entry [50]. Naïve Bayes is a statistical method that uses a probabilistic method based on the Bayesian theory; the probability of a field prone to attack can be calculated [51].…”
Section: Artificial Intelligence For Cyber Securitymentioning
confidence: 99%
“…Supervised learning methods are already specified with the class labels to verify model classification or predictions. The k-nearest neighbours (KNN) method is used to classify the incoming entry as normal or malicious entry [50]. Naïve Bayes is a statistical method that uses a probabilistic method based on the Bayesian theory; the probability of a field prone to attack can be calculated [51].…”
Section: Artificial Intelligence For Cyber Securitymentioning
confidence: 99%
“…e study in [22] used Markov models for feature extraction and solved the problem that Bayesian network classifiers were usually trained on data by selecting suboptimal model heuristics, but the evaluation indicators used in their paper were not exhaustive. e work in [23] used information gain algorithm for feature extraction and solved the problem that the KDD CUP99 dataset did not include the current state of cyber attacks, while the F-measure for the unknown attack category was low. e study in [24] solved the problem that the data became more complex and it was difficult to extract better low-dimensional features effectively as the number of features increased and the accuracy of binary classification on NSL-KDD achieved 95.25%.…”
Section: Related Workmentioning
confidence: 99%