2014
DOI: 10.1016/j.cose.2014.06.006
|View full text |Cite
|
Sign up to set email alerts
|

Selection of Candidate Support Vectors in incremental SVM for network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(33 citation statements)
references
References 6 publications
0
33
0
Order By: Relevance
“…All of the aforementioned detection techniques were evaluated on the KDD Cup 99 dataset. However, due to some limitations in this dataset, which will be discussed in Subsection 5.1, some other detection methods [18], [19], [20], [21], [22], [23] were evaluated using other intrusion detection datasets, such as NSL-KDD [24] and Kyoto 2006+ [25]. A dimensionality reduction method proposed in [25] was to find the most important features involved in building a naive bayesian classifier for intrusion detection.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…All of the aforementioned detection techniques were evaluated on the KDD Cup 99 dataset. However, due to some limitations in this dataset, which will be discussed in Subsection 5.1, some other detection methods [18], [19], [20], [21], [22], [23] were evaluated using other intrusion detection datasets, such as NSL-KDD [24] and Kyoto 2006+ [25]. A dimensionality reduction method proposed in [25] was to find the most important features involved in building a naive bayesian classifier for intrusion detection.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Feature selection is a preprocessing step that is usually applied in the area of data mining, thus, improving the classification rate. The so-called CSV-ISVM algorithm was proposed in [22] and uses incremental SVM in order to select candidate support vectors showing the advantages in real-time network intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…The Decentralized Time-Window Based Real-Time Anomaly Detection Mechanism (DTRAD) in Iot model uses an improved Gauss kernel called U-RBF to suppress noise. Other SVM based models include works by Kuang et al [13], Ahmad et al [14] and Chitrakar and Huang [15]. Other machine learn-ing models used on intrusion detection systems include, Artificial Neural Network based model [16], Decision Tree based IDS model [17], Extreme Learning based model [18] and K-Nearest Neighbor based model [19].…”
Section: Literature Reviewmentioning
confidence: 99%