2009
DOI: 10.1016/j.comnet.2008.11.011
|View full text |Cite
|
Sign up to set email alerts
|

McPAD: A multiple classifier system for accurate payload-based anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
164
0
1

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 230 publications
(166 citation statements)
references
References 32 publications
1
164
0
1
Order By: Relevance
“…The following data mining anomaly detection algorithms are illustrated in Table 2, the results showed that unsupervised models such as Mahalanobi Distance Map (MDM) (Jamdagni et al, 2013) and one-class Support Vector Machine (SVM) (Perdisci et al, 2008) had considerably higher accuracy and false positive rate in same dataset. Moreover, data mining association rule technique such as Fuzzy Association Rule Model (FARM) (Chan et al, 2013) proved to have high accuracy in recognize anomaly attacks as well as considerable low false positive rate.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The following data mining anomaly detection algorithms are illustrated in Table 2, the results showed that unsupervised models such as Mahalanobi Distance Map (MDM) (Jamdagni et al, 2013) and one-class Support Vector Machine (SVM) (Perdisci et al, 2008) had considerably higher accuracy and false positive rate in same dataset. Moreover, data mining association rule technique such as Fuzzy Association Rule Model (FARM) (Chan et al, 2013) proved to have high accuracy in recognize anomaly attacks as well as considerable low false positive rate.…”
Section: Discussionmentioning
confidence: 99%
“…Nevertheless, this dataset is reported to have some problems regarding its outdated data and the increasing growth of web behaviors in the course of time. Therefore, unsupervised data mining (Jamdagni et al, 2013) and semi-supervised anomaly detection (Perdisci et al, 2008) which has shown acceptable results, can be safe for HTTP Web Service request anomaly detection, but the quality of anomalous records is routinely and continuously changing which makes the outliers accurately unattainable for detections over HTTP web service request data. Moreover, high dimensional data always have some possible inaccuracy because of the limitations in quadratic computational complexity (Amer et al, 2013).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Past researches reveal that anomaly based intrusion detection has several flaws, namely a high false positive rate and misjudging a correct data packet as attack packet. PAYL [20] and MCPAD [21] have tried to address these issues. In this research we will also focus on reducing these issues using both supervised and unsupervised anomaly-based intrusion detection.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…Therefore, packet clas-sifiers [10,11] (classifiers that attempt to classify every packet rather than every flow) are out of the scope of this literature review. We also do not discuss anomaly detectors as this is a different subset of Internet traffic classification than what we are pursuing [12][13][14][15].…”
Section: Literature Reviewmentioning
confidence: 99%