2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM) 2018
DOI: 10.1109/wincom.2018.8629718
|View full text |Cite
|
Sign up to set email alerts
|

Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…In summary, the event detection results of the DELM algorithm continuous [18] inspection are better than those of LSTM, DBN, CNN, and GBDT. When PT �1, each algorithm can better balance the three indicators of DR, FAR, and MTTD.…”
Section: Results Analysismentioning
confidence: 90%
“…In summary, the event detection results of the DELM algorithm continuous [18] inspection are better than those of LSTM, DBN, CNN, and GBDT. When PT �1, each algorithm can better balance the three indicators of DR, FAR, and MTTD.…”
Section: Results Analysismentioning
confidence: 90%
“…For instance, to improve the performance of IDS frameworks, the authors of [75] propose a mixed strategy involving Principal Component Analysis and fuzzy clustering with KNN-based FS techniques. A correlation-based FS approach coupled with a Support Vector Machine (SVM) classifier is proposed in [76] to build a cloud-based IDS.…”
Section: Related Work On Feature Selection Applied To Ml-based Intrus...mentioning
confidence: 99%
“…Rao and Swathi (2017) adapted two fast KNN classification algorithms i.e., Indexed Partial Distance Search k-Nearest Neighbor (IKPDS), Partial Distance Search k-Nearest Neighbor (KPDS) and comparing with traditional KNN classification for Network Intrusion Detection on NSL-KDD dataset 2017 (NSL-KDD, 2009). Benaddi et al (2018), the authors propose to use PCA-fuzzy Clustering-KNN method which ensemble of Analysis of Principal Component and Fuzzy Clustering with K-Nearest Neighbor feature selection technics to detect anomalies.…”
Section: Machine Learning Models To Network Anomaly Detectionmentioning
confidence: 99%