2020 16th IEEE International Colloquium on Signal Processing &Amp; Its Applications (CSPA) 2020
DOI: 10.1109/cspa48992.2020.9068725
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Anomaly Classification with Deep Learning (DL) and Binary Algorithms (BA) as Optimizer in the Intrusion Detection System (IDS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…In order to horizontally compare the performance of the LS model proposed in this article with other algorithm models, this chapter selected the commonly used XGBoost iterative algorithm, random forest algorithm in the field of traffic anomaly detection, and the recently proposed hybrid network by Atifi et al [31] as the control group for comparative experiments. According to the Table 8, it can be seen that the LS model proposed in this article has the best F1-score on the DNTAD dataset, reaching 74.56%.…”
Section: Resultsmentioning
confidence: 99%
“…In order to horizontally compare the performance of the LS model proposed in this article with other algorithm models, this chapter selected the commonly used XGBoost iterative algorithm, random forest algorithm in the field of traffic anomaly detection, and the recently proposed hybrid network by Atifi et al [31] as the control group for comparative experiments. According to the Table 8, it can be seen that the LS model proposed in this article has the best F1-score on the DNTAD dataset, reaching 74.56%.…”
Section: Resultsmentioning
confidence: 99%
“…Atefi et al [34] proposed an ensemble-based modified adaptive boosting algorithm to detect network intrusions that have two types such as M-Adaboost-A-SMV and M-Adaboost-A-PSO. This proposed work aimed to solve the imbalance in the network intrusions detection which covers the area of boosting process.…”
Section: Related Workmentioning
confidence: 99%
“…All intrusive activity is considered anomalous by Anomaly detection [13,[15][16][17][23][24][25]. That is, an activity does not match standard treatment as an intrusion.…”
Section: Related Workmentioning
confidence: 99%