2020
DOI: 10.1007/s10489-020-01886-y
|View full text |Cite
|
Sign up to set email alerts
|

I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems

Abstract: Network-based Intrusion Detection Systems (NIDSs) identify malicious activities by analyzing network traffic. NIDSs are trained with the samples of benign and intrusive network traffic. Training samples belong to either majority or minority classes depending upon the number of available instances. Majority classes consist of abundant samples for the normal traffic as well as for recurrent intrusions. Whereas, minority classes include fewer samples for unknown events or infrequent intrusions. NIDSs trained on s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 109 publications
(40 citation statements)
references
References 41 publications
(36 reference statements)
0
40
0
Order By: Relevance
“…All communication data are classified according to the membership degree between the above wireless personal communication data. Because wireless personal communication data mainly includes two kinds of data, one is normal data and the other is malicious intrusion data [10], it is necessary to separate malicious intrusion data from all data. That is to become the focus of this study data.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…All communication data are classified according to the membership degree between the above wireless personal communication data. Because wireless personal communication data mainly includes two kinds of data, one is normal data and the other is malicious intrusion data [10], it is necessary to separate malicious intrusion data from all data. That is to become the focus of this study data.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Abirami et al [124] combined RF, SVM, and NB using a stacking algorithm, where LR was used as a meta-classifier for IDS. Bedi et al [93] proposed an algorithm-level approach called I-SiamIDS, which is a two-layer ensemble for handling class imbalance problems. Cheng et al [128] utilized a semi-supervised hierarchical stacking model for anomaly detection in IoT communication.…”
Section: Mapping Selected Studies By Ensemble Methodsmentioning
confidence: 99%
“…The classification problem becomes more complicated as the data dimensionality increases due to unbounded data values and unbalanced classes. Bedi et al [59] utilized several ML approaches to deal with the class imbalance issue. Thabtah et al [60] also evaluated various approaches to the class imbalance problem.…”
Section: Overview Of the Hcrnnidsmentioning
confidence: 99%