2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE) 2015
DOI: 10.1109/iciteed.2015.7408971
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection model based on ensemble learning for U2R and R2L attacks

Abstract: Intrusion Detection System (IDS) is a tool for anomaly detection in network that can help to protect network security. At present, intrusion detection systems have been developed to prevent attacks with accuracy. In this paper, we concentrate on ensemble learning for detecting network intrusion data, which are difficult to detect. In addition, correlation-based algorithm is used for reducing some redundant features. Adaboost algorithm is adopted to create the ensemble of weak learners in order to create the mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…Support Vector Machine (SVM) approach was used to solve the classification problems based on an optimal hyper plane in a high-dimensional space. The result of this study show that reducing features contributes to improved efficiency in detecting attacks in works in many weak scales [25]. Gaikwad advanced feature choice.…”
Section: Literature Reviewmentioning
confidence: 82%
“…Support Vector Machine (SVM) approach was used to solve the classification problems based on an optimal hyper plane in a high-dimensional space. The result of this study show that reducing features contributes to improved efficiency in detecting attacks in works in many weak scales [25]. Gaikwad advanced feature choice.…”
Section: Literature Reviewmentioning
confidence: 82%
“…Sornsuwit and Jaiyen [27] took into account ensemble learning, e.g., Adaboost to improve the detection of U2R and R2L attacks. In addition, the correlation-based technique was used to reduce redundant features.…”
Section: Mapping Selected Studies By Ensemble Methodsmentioning
confidence: 99%
“…As mentioned above in the previous section, it is a derived version from KDD Cup 99 [6], that groups network traffic collected by 1998 DARPA IDS [4]. NSL KDD contains normal records, and records of attacks namely: DoS (Denial-of-Service) which destroy the service availability [13], Probe which extracts detailed information from the servers [14], U2R (User to Root) which try to exploit vulnerabilities in the system in order to obtain super user privileges [15], and R2L (Remote to Local) which send packets to a machine over a network who have no account on in order to lead to vulnerability issues and access secure information [16]. The distribution is illustrated in Table 1 and Table 2, Table 1 shows the distribution in two classes, whereas Table 2 shows the distribution in five classes.…”
Section: Dataset and Pre-treatments 311 Datasetmentioning
confidence: 99%