2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS) 2017
DOI: 10.1109/icsess.2017.8343013
|View full text |Cite
|
Sign up to set email alerts
|

Incremental k-NN SVM method in intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(16 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…The fundamental function of IDSs, which calls for elevated accuracy, low false alarm rates and effectiveness to predict alarms based on positive or true alarms when intrusion occurs and false positive or false alarms in the event of a failure [8]. Those can be used to defend the systems from different kind of attacks.…”
Section: Idmentioning
confidence: 99%
See 1 more Smart Citation
“…The fundamental function of IDSs, which calls for elevated accuracy, low false alarm rates and effectiveness to predict alarms based on positive or true alarms when intrusion occurs and false positive or false alarms in the event of a failure [8]. Those can be used to defend the systems from different kind of attacks.…”
Section: Idmentioning
confidence: 99%
“…Because Cloud infrastructure runs through standard Internet protocols and uses virtualization techniques, it may be vulnerable to attacks. Those attacks may come from traditional sources such as Address Resolution Protocol, IP spoofing, Denial of Service (DoS) etc [8], [9]. They may also come from other sources.…”
Section: Introductionmentioning
confidence: 99%
“…There are three popular methods for analyzing the network traffic to detect intrusive behaviors: statisticalbased, machine learning-based, and knowledge-based methods [3]. Among these, machine learning-based methods have received a great attention and achieved remarkable success recently [1,[4][5][6][7][8][9][10][11][12][13][14][15] even for encrypted network traffic [16,17]. To train a good detection model for IDS in the real world, a considerable number of attack and normal data samples are required to be gathered.…”
Section: Introductionmentioning
confidence: 99%
“…An incremental k-NN-SVM method is explored by Xu et al [208]. The data in batches are clustered using K-Means clustering (online aspect).…”
Section: Combination Methodsmentioning
confidence: 99%