Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2007
DOI: 10.1016/j.ins.2007.03.025
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid machine learning approach to network anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
111
0
2

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 355 publications
(133 citation statements)
references
References 23 publications
(39 reference statements)
0
111
0
2
Order By: Relevance
“…Shon and Moon employed a Self-Organized Feature Map (SOFM) to decrease the false alarm rate of neural networks [Shona and Moon, 2007].…”
Section: Supervised Approachesmentioning
confidence: 99%
“…Shon and Moon employed a Self-Organized Feature Map (SOFM) to decrease the false alarm rate of neural networks [Shona and Moon, 2007].…”
Section: Supervised Approachesmentioning
confidence: 99%
“…One class SVM using unsupervised learning for detecting anomalies has a limitation of a high false positive rate. Therefore, Shon T et al [1] proposed enhanced SVM which combines unsupervised and supervised learning to reduce false alarms.…”
Section: Related Workmentioning
confidence: 99%
“…The Internet users access these free services that make them susceptible to attacks which include data stealing [1]. For ensuring, the security policy of data, a modern computer network uses the intrusion detection system (IDS) which is an integral part of well-defined and organized network.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For analyzing packets that contain a payload, deep packet inspection techniques are favored. Signature or anomaly based detection is applied to these packets [10,13,25,27,8,28]. To foil this mechanism, malware may use the same secure protocols that users employ to protect themselves from malicious agents [24,18].…”
Section: Related Workmentioning
confidence: 99%