2019
DOI: 10.1007/s00521-019-04396-2
|View full text |Cite
|
Sign up to set email alerts
|

NSNAD: negative selection-based network anomaly detection approach with relevant feature subset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 65 publications
0
9
0
Order By: Relevance
“…Aissa et al proposed a negative selection-based network anomaly detection approach with relevant feature subset and applied it to the field of network anomaly detection. The algorithm uses the feature selector based on variation coefficient ranking to select features, which shortens the learning and classification time (reduces the time complexity) [27]. Abid et al designed a fault diagnosis algorithm based on negative selection theory.…”
Section: Related Workmentioning
confidence: 99%
“…Aissa et al proposed a negative selection-based network anomaly detection approach with relevant feature subset and applied it to the field of network anomaly detection. The algorithm uses the feature selector based on variation coefficient ranking to select features, which shortens the learning and classification time (reduces the time complexity) [27]. Abid et al designed a fault diagnosis algorithm based on negative selection theory.…”
Section: Related Workmentioning
confidence: 99%
“…AIS have seen two generations of algorithms developed (Greensmith, Whitbrook & Aickelin, 2010). First generation models were designed around general abstractions of traditional immune models, such as negative selection (Belhadj Aissa, Guerroumi & Derhab, 2020), clonal selection (Lysenko, Bobrovnikova & Savenko, 2018), and immune networks (Shi et al, 2017).…”
Section: Related Workmentioning
confidence: 99%
“…AIS algorithms mainly include negative selection algorithms (NSA) [11], artificial immune networks [10], clonal selection algorithms [13], danger theory, dendritic cell algorithms [1], etc. AIS also has many successful applications, such as anomaly detection [3], computer security [16], data mining [7], control algorithm [32,33], and fault diagnosis [4,15,29]. Among them, NSA deals well with the problem of more normal data and less abnormal data and has attracted wide attention in anomaly detection.…”
Section: Introductionmentioning
confidence: 99%