2017 25th Signal Processing and Communications Applications Conference (SIU) 2017
DOI: 10.1109/siu.2017.7960616
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion detection using machine learning anomaly detection algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 7 publications
0
9
0
2
Order By: Relevance
“…We used a hybrid feature selection process to identify the important features for each family of attacks. Overall, the most important features were: dur (7), which occurred in all the attack families except Worms; service (14), which occurred in all the attack families except DoS and Exploits; sttl and dttl (10 and 11 respectively) that occurred in six of the nine attack families; and ct_srv_src (41) which occurred in five of the attack families. Using the subset of features identified through the hybrid feature selection process, we achieved a higher classification rate as well as lower FAR rate for most families of attacks using the NB classifier.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…We used a hybrid feature selection process to identify the important features for each family of attacks. Overall, the most important features were: dur (7), which occurred in all the attack families except Worms; service (14), which occurred in all the attack families except DoS and Exploits; sttl and dttl (10 and 11 respectively) that occurred in six of the nine attack families; and ct_srv_src (41) which occurred in five of the attack families. Using the subset of features identified through the hybrid feature selection process, we achieved a higher classification rate as well as lower FAR rate for most families of attacks using the NB classifier.…”
Section: Resultsmentioning
confidence: 99%
“…BackDoor is identifiable by one flow feature, protocol type (5), three basic features (6,7,14), one content feature (25), three time features, tcprtt, synack, and ackdat (33, 34 and respectively) and two additionally generate features, ct_state_ttl and is_ftp_login (37 and 39 respectively).…”
Section: Analysis Of the Selected Featuresmentioning
confidence: 99%
See 2 more Smart Citations
“…Karslıgel vd. tarafından önerilen anormallik tespit sistemi NSL-KDD veri kümesi üzerinde, yarı-eğitmenli k-ortalama kümeleme algoritması kullanılarak geliştirilmiş ve %80.119 doğruluk oranı sunmuştur [3]. Ağ saldırı tespiti için derin öğrenme yaklaşımının KDD Cup '99 ve NSL-KDD veri kümeleri üzerinde uygulandığı Shone vd.…”
Section: Introductionunclassified