2020
DOI: 10.1016/j.matpr.2020.06.218
|View full text |Cite
|
Sign up to set email alerts
|

Review on intrusion detection using feature selection with machine learning techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 37 publications
0
11
0
Order By: Relevance
“…Most of the papers on heuristic intrusion detection have focused on machine learning [ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 ]. The authors of this paper consider a different approach to intrusion detection: packet scoring.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the papers on heuristic intrusion detection have focused on machine learning [ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 ]. The authors of this paper consider a different approach to intrusion detection: packet scoring.…”
Section: Related Workmentioning
confidence: 99%
“…NIDS analyses network traffic passing through computer environments [14,3]. Its role is mainly to monitor the network events against suspicious activities that may violate or bypass security policies of security components such as firewalls, Web Application Firewalls and proxies.…”
Section: B Intrusion Detection Systemsmentioning
confidence: 99%
“…The Global Internet Usage Statistics report confirms a growth of 1,114% and more than 2 quintillion bytes of data are generated every day. Along with this growth, cybercrime is becoming more sophisticated and continues to grow day by day [1,2,3]. As a result, the risks of being attacked and targeted by the hacker community remain more likely and could be costly for victims of cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Numerous machine-learning-based detection approaches are studied, for example, detecting multi-type attacks in the cloud [36,37], cyber-aggressive comments [38], early fault in predictive maintenance [39], brain tumor [40], voice activity [41], plant diseases [42]. Related to trending topics detection, the existing event detection algorithms can be divided into three main approaches based on textual content of the news, namely document pivot, feature pivot, and probabilistic topic model [43,44].…”
Section: Literature Reviewmentioning
confidence: 99%