2022
DOI: 10.7717/peerj-cs.820
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion detection using oversampling technique and machine learning algorithms

Abstract: The expeditious growth of the World Wide Web and the rampant flow of network traffic have resulted in a continuous increase of network security threats. Cyber attackers seek to exploit vulnerabilities in network architecture to steal valuable information or disrupt computer resources. Network Intrusion Detection System (NIDS) is used to effectively detect various attacks, thus providing timely protection to network resources from these attacks. To implement NIDS, a stream of supervised and unsupervised machine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(20 citation statements)
references
References 48 publications
0
18
0
2
Order By: Relevance
“…In ML and statistics, there are a variety of methods for evaluating the performance of a classifer. Te most common metrics are as follows: Applied Computational Intelligence and Soft Computing (i) Confusion matrix is the most widely used metric (see Table 3) [29,30].…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…In ML and statistics, there are a variety of methods for evaluating the performance of a classifer. Te most common metrics are as follows: Applied Computational Intelligence and Soft Computing (i) Confusion matrix is the most widely used metric (see Table 3) [29,30].…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…erefore, this paper uses a modified Tent chaotic mapping to initialize the population. e expression of this chaotic mapping is shown in (1). Random variables rand × (1/N T ) are added to avoid the Tent mapping from falling into small or unstable periodic points without destroying the properties of chaotic variables, where N T is the quantity of particles in the chaotic sequence; rand is a random variable with values in the range [0, 1].…”
Section: Initialization Of Bat Populationsmentioning
confidence: 99%
“…e security of computer networks has received an increasing amount of focus as a natural consequence of the ongoing development of both computer technology and networks. However, there are a large number of complex attacks in the network, and these attacks have become the main threats to network and information security [1]. As the second line of defense after the firewall, intrusion detection has proactive and dynamic defense capabilities, effectively making up for the deficiencies of traditional security technologies [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…Hasil menunjukkan Random Forest dengan menggunakan teknik ADASYN lebih unggul dari pada menggunakan teknik SMOTE. Pada beberapa penelitian dengan menggunakan algoritma Random Fores dan dataset yang sama yaitu UNSW-NB15, menggunakan teknik SMOTE [11] mendapatkan akurasi 95,1%, dengan teknik clustering under-sampling [12] mendapatkan akurasi 97,1%, dengan teknik Random Over-sampling [13] mendapatkan akurasi 87,82%, dan menggunakan algoritma Random Fores saja [14] mendapatkan hasil akurasi 98,86%.…”
Section: Pendahuluanunclassified