2013 IEEE Third International Conference on Information Science and Technology (ICIST) 2013
DOI: 10.1109/icist.2013.6747642
|View full text |Cite
|
Sign up to set email alerts
|

Real time multi stage unsupervised intelligent engine for NIDS to enhance detection rate of unknown attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…In another study, Amoli and Hamalainen [15] proposed a real-time multi-stage intrusion detection system in order to enhance the detection rate of unknown attacks. The first stage detects potential attacks by monitoring a set of traffic features that include the size and number of bytes, packets, and network flows.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In another study, Amoli and Hamalainen [15] proposed a real-time multi-stage intrusion detection system in order to enhance the detection rate of unknown attacks. The first stage detects potential attacks by monitoring a set of traffic features that include the size and number of bytes, packets, and network flows.…”
Section: Related Workmentioning
confidence: 99%
“…In order to increase the detection rate, the system monitors the rate of time difference between each packet (TDP) and network flows (TDF). Sub-space clustering is used to unsupervisedly cluster the previously flagged traffic, which allows the differentiation of normal traffic through the detection of the outliers with lower processing time and complexity in comparison with multidimensional clustering algorithms [15]. After obtaining several two-dimensional clusters, DBSCAN [16] is used for to create the proper clusters and to identify the outliers.…”
Section: Related Workmentioning
confidence: 99%
“…Supervised learning technique needs to be trained firstly by pre-classified traffic sample to build the classification model and map the behavior of the network to find the difference between normal and abnormal state. The shortcomings of this technique is that the system is trained on the existing attacks, which may fail to detect a novel attacks, also in most circumstances, labeled data is not readily available since it is time consuming and expensive to manually classify it [5][6][7]. Many researches try to address these problems by using unsupervised learning techniques such as clustering; by using clustering techniques, they try to measure the deviation of the new instances from the different created clusters.…”
Section: Introductionmentioning
confidence: 99%