2018
DOI: 10.21533/pen.v6i1.289
|View full text |Cite
|
Sign up to set email alerts
|

Study and analysis of intrusion detection system using random forest and linear regression

Abstract: The cyber security is the challenging job in present network system. There are number of existing Intrusion Detection Systems are available to overcome the issues, in this paper we proposed the linear regression and random forest technique is used. The latest UNSW-NB15 dataset is used for analyzing the proposed methods. Selecting significant features and removing irrelevant features by using proposed learning methods as well as identifying the best method by evaluating the results obtained.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…It is also susceptible to outliers and multicollinearity. LR must be modified utilizing one-vs-all or one-vs-one techniques to be relevant in circumstances involving several classes [20].…”
Section: Backgrounds and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It is also susceptible to outliers and multicollinearity. LR must be modified utilizing one-vs-all or one-vs-one techniques to be relevant in circumstances involving several classes [20].…”
Section: Backgrounds and Related Workmentioning
confidence: 99%
“…Random forest is opaque, making it difficult to understand the basis behind forecasts. Furthermore, its prediction time is longer than that of single decision trees, and characteristics such as the number of trees must be tuned for improved results [20], [22].…”
Section: Backgrounds and Related Workmentioning
confidence: 99%
“…The correlation between the independent and dependent variables is the definition of this method. Kumar and Raaza [45] the independent variable is thought of as input values, and the dependent variable is thought of as output values.…”
Section: Linear Regression (Lr)mentioning
confidence: 99%
“…The targets that are tracked can be even directly such as tracking moving objects or based on video surveillance such as monitoring status at specific location. The tracking processes are illustrated briefly by mining data related from an interested image edge in order to discover the shape of the object, tracing the object among the frames taken from the image, and evaluating the target object to understand its behavior [4,5,6]. The hierarchical structure that integrates the robotic systems, the edge processing and the tracking methods in a uniformed robust module is called visual servoing.…”
Section: Introductionmentioning
confidence: 99%