2019
DOI: 10.1007/s12652-019-01417-9
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of unsupervised techniques in cyber-attack anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(17 citation statements)
references
References 23 publications
0
17
0
Order By: Relevance
“…For instance, the degree of freedom of the Machine Learning model was not considered in [3] to evaluate the number of adjustable parameters or weights and [51] suggested to fine-tune "hyper-parameters" in the framework doing the learning, but it is still not an optimal evaluation approach. In [52,53], various assessment methods have been suggested to test and assess Machine Learning models without mentioning the confusion matrix. Recently, Maseer et al [54] have used the CICIDS 2017 dataset to evaluate the Machine Learning model but the time complexity and confusion matrix were not considered.…”
Section: Ip Addressmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, the degree of freedom of the Machine Learning model was not considered in [3] to evaluate the number of adjustable parameters or weights and [51] suggested to fine-tune "hyper-parameters" in the framework doing the learning, but it is still not an optimal evaluation approach. In [52,53], various assessment methods have been suggested to test and assess Machine Learning models without mentioning the confusion matrix. Recently, Maseer et al [54] have used the CICIDS 2017 dataset to evaluate the Machine Learning model but the time complexity and confusion matrix were not considered.…”
Section: Ip Addressmentioning
confidence: 99%
“…Recently, Maseer et al [54] have used the CICIDS 2017 dataset to evaluate the Machine Learning model but the time complexity and confusion matrix were not considered. The discussion of the validation drawbacks presented in [3,[51][52][53][54]] is summarised in Table 3. Reference Drawbacks [3] The time complexity was not considered.…”
Section: Ip Addressmentioning
confidence: 99%
See 1 more Smart Citation
“…They also published an available dataset of 17,880 annotated job ads, retrieved from the use of a real-life system. An empirical study of different unsupervised learning algorithms used in the detection of unknown attacks was presented by Meira et al (2020). reviewed different intrusion detection system datasets in detail.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…These methods are present in numerous domains and research fields. These can be found in industrial machinery failure [28][29][30], credit card fraud [31][32][33], image processing [34,35], medical and public health [36][37][38], network intrusion [39][40][41][42], and others [43][44][45][46][47]. We focused on One-Class Classification (OCC) [17] methods to understand whether we could improve the results of the best classification algorithm.…”
Section: Computational Techniquesmentioning
confidence: 99%