2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA) 2017
DOI: 10.1109/ciapp.2017.8167184
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning based network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…They can foil existing malware attacks such as backdoors, trojans, and rootkits [6,30] and detect social engineering attacks such as phishing and man-in-the-middle attacks [24,35]. Most frequently ML techniques play an important role in NIDS architectures because they provide lower false alarm rates, higher detection rates, and better capabilities of finding mutations of known and unknown attacks not detectable by conventional techniques [16,17,41,44].…”
Section: Introductionmentioning
confidence: 99%
“…They can foil existing malware attacks such as backdoors, trojans, and rootkits [6,30] and detect social engineering attacks such as phishing and man-in-the-middle attacks [24,35]. Most frequently ML techniques play an important role in NIDS architectures because they provide lower false alarm rates, higher detection rates, and better capabilities of finding mutations of known and unknown attacks not detectable by conventional techniques [16,17,41,44].…”
Section: Introductionmentioning
confidence: 99%
“…One of these techniques is based on machine learning. Machine learning (ML) techniques can predict and detect threats before they result in major security incidents [3]. Classifying instances into two classes is called binary classification.…”
Section: Introductionmentioning
confidence: 99%
“…Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are fundamental in defending against the DoS and DDoS attacks. Research on the Machine-Learning (ML) Based Network Intrusion Detection Systems (NIDS) is of high interest in the scientific community and in industrial practice [30][47] [23]. One of the major obstacles to the wide deployment of ML-based NIDS is the necessity to collect labelled data on premises of the protected network [27], since the ML-components need to learn the specific data distributions.…”
Section: Introductionmentioning
confidence: 99%