2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) 2020
DOI: 10.1109/3ict51146.2020.9312002
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System using Feature Selection With Clustering and Classification Machine Learning Algorithms on the UNSW-NB15 dataset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…These measures were calculated using the appropriate equations, which were based on sources [28][29][30][31]. (6) where TP is the true positive, TN is the true negative, FP is the false positive, and FN is the false negative.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…These measures were calculated using the appropriate equations, which were based on sources [28][29][30][31]. (6) where TP is the true positive, TN is the true negative, FP is the false positive, and FN is the false negative.…”
Section: Resultsmentioning
confidence: 99%
“…In [6], four algorithms-naive Bayes (NB), RF, J48, and zero-were utilized to categorize cyberattacks on the UNSW-NB15 dataset. Two groups were created using the UNSW-NB15 dataset using K-means and expectation maximization clustering techniques, depending on whether the objective attack is used or regular network traffic only.…”
Section: Related Workmentioning
confidence: 99%
“…In the labyrinth of cyber threats, this research stands as a guiding beacon, illuminating a path towards a more secure and resilient digital future. [10]…”
Section: Discussionmentioning
confidence: 99%
“…Filter based on feature selection XGBoost [9] is used for detecting network attacks by using machine learning classification techniques with 91% accuracy. Feature selection approach [10] uses correlation techniques as naive bays (NB), Random Forest (RF), J48, and ZeroR. Study of various IDS techniques [11] for identifying attacks using classification algorithms.…”
Section: Literature Reviewmentioning
confidence: 99%