2020
DOI: 10.3233/jifs-191621
|View full text |Cite
|
Sign up to set email alerts
|

A classification model based on svm and fuzzy rough set for network intrusion detection

Abstract: Intrusion Detection Systems (IDS) are designed to provide security into computer networks. Different classification models such as Support Vector Machine (SVM) has been successfully applied on the network data. Meanwhile, the extension or improvement of the current models using prototype selection simultaneous with their training phase is crucial due to the serious inefficacies during training (i.e. learning overhead). This paper introduces an improved model for prototype selection. Applying proposed prototype… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 64 publications
0
4
0
Order By: Relevance
“…Recently, authors in [26], used fuzzy rough sets theory (FRST) for prototype selection to enhance SVM in intrusion detection system (IDS). Their experimental results show that the proposed technique provides better generalization in terms of precision, recall, and accuracy rate.…”
Section: Fuzzy Rough Set Based Feature Selection Methodsmentioning
confidence: 99%
“…Recently, authors in [26], used fuzzy rough sets theory (FRST) for prototype selection to enhance SVM in intrusion detection system (IDS). Their experimental results show that the proposed technique provides better generalization in terms of precision, recall, and accuracy rate.…”
Section: Fuzzy Rough Set Based Feature Selection Methodsmentioning
confidence: 99%
“…(4) Decision discrimination, in this stage, the intrusion detection system discriminates the decision on the detection results. The trained one is deployed on the test dataset to be detected or deployed in the network environment to discriminate the intrusion detection results, identify the intrusion events, and respond [11][12].…”
Section: Intrusion Detection Framework Based On Machine Learningmentioning
confidence: 99%
“…Traditional methods include one-dimensional distance profile recognition based on Support Vector Machines (SVM) [7][8] , feature extraction using Gaussian Mixture Model (GMM) 9 , and so on. However, these methods rely on shallow linear structures and cannot fully extract features representing target information.…”
Section: Introductionmentioning
confidence: 99%