2014
DOI: 10.1007/978-3-319-10085-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Towards Practical Anomaly-Based Intrusion Detection by Outlier Mining on TCP Packets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…K-Map is useful for distinction of the data but it is not supported for large volume of data. Support Vector Machine (SVM) [19][20][21][22][23] [ [25][26][27][28][29][30][31][32]: is beneficial for classification and reformation of data, but at the same time SVM only cannot powerfully in recognizing about new data. Given a set of trained-data-set which require more computational time for big-data [4,12].…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…K-Map is useful for distinction of the data but it is not supported for large volume of data. Support Vector Machine (SVM) [19][20][21][22][23] [ [25][26][27][28][29][30][31][32]: is beneficial for classification and reformation of data, but at the same time SVM only cannot powerfully in recognizing about new data. Given a set of trained-data-set which require more computational time for big-data [4,12].…”
Section: B Related Workmentioning
confidence: 99%
“…Fuzzy Logic based techniques found best in detection of intrusion for as compared to Data Mining, K-Map [21], MLP [25][26][27][28][29][30], Random Forest [25][26][27][28][29][30], SVM [32,33], Neural Network [31][32][33] and dimensionality reduction [35][36][37].…”
Section: B Related Workmentioning
confidence: 99%
“…SVM is based on the hyper-plane and transforms the data from lower dimension into the higher dimensions and there in high dimensional space tries to find a hyper-plane that effectively distinguishes two or more classes. From work [19] Given n training data points {(x 1 , y 1 ), (x 2 ,y 2 ), (x 3 , y 3 ), ..., (x n , y n )}, where xi ∈ R d and y i ∈ {+1, −1}. Consider a hyper-plane defined by (w, b), where w is a weight vector and b is a bias, new object x can be classified with…”
Section: Support Vector Machine (Svm)mentioning
confidence: 99%
“…Intrusion detection is an efficient method of dealing with network security related problems [1]. Network Security has become a serious concern due to the development and expansion in the field of Information Technology [2].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, an effective and timely Intrusion Detection System, which helps to enhance the security of a network, is needed when attack(s) is/are noticed [3]. Intrusion detection is a security approach used to protect computer networks from unauthorised access [1].…”
Section: Introductionmentioning
confidence: 99%