2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2016
DOI: 10.1109/icitst.2016.7856705
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning classification model for Network based Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 11 publications
0
22
0
Order By: Relevance
“…The dataset was used to build the ML Classifiers using WEKA [30]. In this study, the focus is only on the evaluation of ensemble ML classification model, as the evaluation of individual classifiers is already done in our previous work [10].…”
Section: Methodology and Implementationmentioning
confidence: 99%
See 4 more Smart Citations
“…The dataset was used to build the ML Classifiers using WEKA [30]. In this study, the focus is only on the evaluation of ensemble ML classification model, as the evaluation of individual classifiers is already done in our previous work [10].…”
Section: Methodology and Implementationmentioning
confidence: 99%
“…1, comprised of Traffic generation, preprocessing, model building and evaluation of the ML model. Traffic was generated for both benign and malicious applications using the method mentioned in our previous research [10]. A number of benign applications were used to generate real traffic which were installed from Google playstore.…”
Section: Methodology and Implementationmentioning
confidence: 99%
See 3 more Smart Citations