2021
DOI: 10.1049/ise2.12051
|View full text |Cite
|
Sign up to set email alerts
|

PCA mix‐based Hotelling's T2multivariate control charts for intrusion detection system

Abstract: Most of the data, which is in the field of network intrusion detection, have the characteristics of a mixture of high-dimensional datasets of continuous and categorical variables. It easily leads the traditional multivariate control chart to get the error detection results. Hotelling's T 2 multivariate control charts based on Principal Component Analysis mix (PCA mix) with bootstrap control limit were proposed, and applied to the network intrusion detection system. It was compared with the conventional Hotelli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 46 publications
0
4
0
Order By: Relevance
“…Te combination of the PKE system (key generation 1, encryption, and decryption) and public key signature system (key generation 2, signature, and verifcation) is the CPK cryptosystem (key generation, encryption, decryption, signature, and verifcation). Here, the encryption and decryption algorithms are the original algorithms of the PKE system before combination [17]. Similarly, the signature and verifcation algorithm is the original algorithm of the precombination public-key signature system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Te combination of the PKE system (key generation 1, encryption, and decryption) and public key signature system (key generation 2, signature, and verifcation) is the CPK cryptosystem (key generation, encryption, decryption, signature, and verifcation). Here, the encryption and decryption algorithms are the original algorithms of the PKE system before combination [17]. Similarly, the signature and verifcation algorithm is the original algorithm of the precombination public-key signature system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The PCA-based T 2 chart using the robust estimator fast minimum covariance determinant (FMCD) and KDE control limit a lower False Negative and higher accuracy than the other charts 24 . The PCA Mix and Kernel PCA (KPCA) Mix control chart perform better in detecting network anomalies than the other methods 25 , 26 .…”
Section: Introductionmentioning
confidence: 99%
“…To counter these attacks, Intrusion Detection and Prevention Systems (IDPS) have emerged as a crucial tool in safeguarding networks [8]- [10]. These systems effectively detect and mitigate DDoS attacks to prevent service disruption and data compromise [11].…”
Section: Introductionmentioning
confidence: 99%