2018
DOI: 10.1016/j.cose.2018.04.010
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 147 publications
(60 citation statements)
references
References 22 publications
0
58
0
2
Order By: Relevance
“…In wireless mesh environments, Vijayan et al [10] proposed an intrusion detection system that used the genetic algorithm (GA) as a feature selection method and multiple Support Vector Machines (SVM) for classification. Their system was based on a linear combination of multiple SVM classifiers, which were ordered based on the severity of the attacks.…”
Section: Cicids2017 Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In wireless mesh environments, Vijayan et al [10] proposed an intrusion detection system that used the genetic algorithm (GA) as a feature selection method and multiple Support Vector Machines (SVM) for classification. Their system was based on a linear combination of multiple SVM classifiers, which were ordered based on the severity of the attacks.…”
Section: Cicids2017 Related Workmentioning
confidence: 99%
“…Sort the Eigen-vectors by decreasing the Eigen-values and choose k Eigen-vectors with the largest Eigen-values to form W. 8. Use W to transform the samples onto the new subspace using Equation (10).…”
Section: Dimensionality Reduction Using Aementioning
confidence: 99%
“…Though the training of deep learning depends on the huge amount of training data heavily, and the hyper-parameters optimization of deep neural networks is difficult [18]. In the above methods, the support vector machine (SVM) algorithm is a kind of supervised learning algorithm based on statistical theory [19]. And based on the kernel function transformation and structural risk minimization (SRM) principle, the traffic classification is transformed into a quadratic optimization problem, which has good classification accuracy and stability.…”
Section: Methods Based On Machine Learning Techniquesmentioning
confidence: 99%
“…Faris H et al propose an intelligent detection system that is based on GA and Random Weight Network to deal with email spam detection tasks [22], and the experimental results confirm that the proposed system can achieve remarkable results in terms of accuracy, precision, and recall. Vijayanand R et al propose a novel intrusion detection system with GA based feature selection and multiple support vector machine classifiers for wireless mesh networks [23]. The system proposed by them exhibits a high accuracy of attack detection and is suitable for intrusion detection in wireless mesh networks.…”
Section: Related Workmentioning
confidence: 99%
“…Basic Features state(1), dur(2), sbytes(3), dbytes(4), sttl(5), dttl (6), sloss (7), dloss (8), service (9), sload (10), dload (11), spkts (12), dpkts (13) Content Features swin (14), dwin (15), stcpb (16), dtcpb (17), smeansz (18), dmeansz (19), trans depth (20), res bdy len (21) Time Features sjit (22), djit (23), stime (24), ltime (25), sintpkt (26), dintpkt (27), tcprtt (28), synack (29), ackdat (30) Additional Generated Features is sm ips ports(31), ct state ttl(32), ct flw http mthd(33), is ftp login(34), ct ftp cmd(35), ct srv src(36), ct srv dst(37), ct dst ltm(38), ct src ltm(39), ct src dport ltm(40), ct dst sport ltm(41), ct dst src ltm(42) 8,9,10,12,13,17,19,20,22,24,25,26,27,28,29,30,34,35,38 20 Shellcode 3,4,5,…”
Section: Classmentioning
confidence: 99%