2022
DOI: 10.1002/int.22877
|View full text |Cite
|
Sign up to set email alerts
|

ICDF: Intrusion collaborative detection framework based on confidence

Abstract: Many machine-learning-based intrusion detection methods have been proposed, however there is a lack of collaboration among these methods.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…Te proposed method also can detect botnets in an online manner based a new anomaly scoring function representing the maliciousness of network connections. Similar to this work, Wang et al [32] introduced an intrusion collaborative detection framework based on confdence.…”
Section: Related Workmentioning
confidence: 85%
See 2 more Smart Citations
“…Te proposed method also can detect botnets in an online manner based a new anomaly scoring function representing the maliciousness of network connections. Similar to this work, Wang et al [32] introduced an intrusion collaborative detection framework based on confdence.…”
Section: Related Workmentioning
confidence: 85%
“…Compared with traditional machine learning methods, automatic feature extraction methods have a deeper level of learning ability. Terefore, these approaches have a wide range of application scenarios in industry or academia, such as machinery fault diagnosis [27][28][29], network stream detection [30], botnet detection [31], and intrusion collaborative detection [32]. As mentioned in these references, the automatic feature extraction methods always adopt neural networks to extract features.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…By identifying outliers, researchers can obtain vital knowledge that assists in making better decisions or avoiding risks. Thus, outlier detection is widely used in many fields, such as fraud detection [2][3][4][5][6], intelligent transportation [7][8][9][10], video content analysis and detection [11][12][13], network intrusion detection and IoT security [14][15][16][17][18][19][20], data generation [21,22], and social media analysis [23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…By identifying outliers, researchers can obtain vital knowledge that assists in making better decisions or avoiding risks. So, outlier detection is widely used in many fields, such as network intrusion detection [2][3][4][5], intelligent transportation [6][7][8][9], video content analysis and detection [10][11][12], fraud detection [13][14][15], social media analysis [16][17][18][19], and data generation [20,21].…”
Section: Introductionmentioning
confidence: 99%