2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013
DOI: 10.1109/icccnt.2013.6726835
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid artificial immune system for IDS based on SVM and belief function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…SVM with Belief theory Singh et al [7] This method is a hybrid one wherein intrusive behavior is detected using the Dempster belief algorithm (DCA) and Dendritic Cell Algorithm and where data are classified with the SVM.…”
Section: Fuzzy Multiclass Svmmentioning
confidence: 99%
See 3 more Smart Citations
“…SVM with Belief theory Singh et al [7] This method is a hybrid one wherein intrusive behavior is detected using the Dempster belief algorithm (DCA) and Dendritic Cell Algorithm and where data are classified with the SVM.…”
Section: Fuzzy Multiclass Svmmentioning
confidence: 99%
“…Compared with that in Table 8 for UNSW-NB15 data set, the accuracy of the multiclass classifications in Table 9 was lower because of the effects of imbalanced data. We analyzed several cases of misclassification of the training data and discovered that they primarily occurred for six minority classes: Analysis (0), Backdoor (1), DoS (2), Exploits (3), Fuzzers (4), and Reconnaissance (7). Thus, SMOTE was employed to oversample six minority classes by using the command, BorderlineSMOTE(sampling_ strategy = 'minority') for multiclass classification accuracy and compare the model performance of RF with the SVC.…”
Section: Case Ii: Over-sampling For Misclassification Classmentioning
confidence: 99%
See 2 more Smart Citations
“…Then, the classifier is used to classify unlabeled test data to distinguish normal data and intrusion data. Many basic supervised learning algorithms such as decision tree [1], [2], [3], support vector machine [4], [5], neural network [6], [7] and ensemble learning [8], were all used in intrusion detection system. In addition, some unsupervised methods were also applied to assist supervised models in some cases.…”
Section: Related Workmentioning
confidence: 99%