2021
DOI: 10.1155/2021/8986243
|View full text |Cite
|
Sign up to set email alerts
|

Improving the Accuracy of Network Intrusion Detection with Causal Machine Learning

Abstract: In recent years, machine learning (ML) algorithms have been approved effective in the intrusion detection. However, as the ML algorithms are mainly applied to evaluate the anomaly of the network, the detection accuracy for cyberattacks with multiple types cannot be fully guaranteed. The existing algorithms for network intrusion detection based on ML or feature selection are on the basis of spurious correlation between features and cyberattacks, causing several wrong classifications. In order to tackle the abov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 47 publications
0
3
0
Order By: Relevance
“…However, with the explosive growth of network traffic, abnormal network traffic is increasingly characterized by complexity, concealment, and diversity, causing the failure of traditional attack detection systems [ 6 ]. To cope with this trend, researchers have developed many attack detection methods based on rough set theory, machine learning, and deep learning [ 7 ]. For example, traditional detection methods based on rough set theory [ 8 ] have the advantage of being able to detect network attacks, even with incomplete data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, with the explosive growth of network traffic, abnormal network traffic is increasingly characterized by complexity, concealment, and diversity, causing the failure of traditional attack detection systems [ 6 ]. To cope with this trend, researchers have developed many attack detection methods based on rough set theory, machine learning, and deep learning [ 7 ]. For example, traditional detection methods based on rough set theory [ 8 ] have the advantage of being able to detect network attacks, even with incomplete data.…”
Section: Introductionmentioning
confidence: 99%
“…This noise and redundant information is closely related to useful information, which not only increases the computational complexity and time consumption of attack detection but also leads to the deletion of useful information while retaining part of the noise and redundant information during feature dimension reduction. This creates serious challenges for attack detection technology [ 7 ]. Due to the difficulty in collecting samples of some attack types in the existing detection dataset, the actual number of cases is small, and data imbalance is prevalent [ 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…This is accomplished by removing the feature's mean from each value and then dividing by the standard deviation. Mathematical equation for this strategy is given as (2), where X is an original value and X is the normalized value [36]:…”
mentioning
confidence: 99%