2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013
DOI: 10.1109/icccnt.2013.6726604
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid method based on genetic algorithm, self-organised feature map, and support vector machine for better network anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Among those papers, we were able to identify three categories based on the type of task they address. The first group of papers presents a novel hybrid method for network anomaly detection by incorporating both supervised and unsupervised methods in their work [ 64 , 65 , 66 ], while the second group also presents a novel hybrid method, but also a more in-depth evaluation compared to some other methods [ 67 ]. In the third group, which focuses exclusively on the comparison between different ML techniques, a total of six papers were identified.…”
Section: Related Workmentioning
confidence: 99%
“…Among those papers, we were able to identify three categories based on the type of task they address. The first group of papers presents a novel hybrid method for network anomaly detection by incorporating both supervised and unsupervised methods in their work [ 64 , 65 , 66 ], while the second group also presents a novel hybrid method, but also a more in-depth evaluation compared to some other methods [ 67 ]. In the third group, which focuses exclusively on the comparison between different ML techniques, a total of six papers were identified.…”
Section: Related Workmentioning
confidence: 99%
“…C8 [41] KDD99 dataset In this model, GA and SOFM were used for feature extraction on the dataset. e goal was feature reduction on the dataset to be used in training SVM.…”
Section: Datasetmentioning
confidence: 99%
“…An anomaly detection method has been emphasized by using an information gain based feature selection method and SOM algorithm in the study carried out on the detection of network based attacks by Anil and Remya [5]. KDD99 (International Information Discovery and Data Mining Competition, 1999) data sets were used for feature selection and evaluating the performance of anomaly-based systems and.…”
Section: Current Studiesmentioning
confidence: 99%
“…However, anomaly detection can be used effectively in different areas, especially in cancer surveillance and military surveillance of hostile activities [6]. There are several techniques developed for anomaly detection [5][6] [7]. One of these techniques is "Clustering Based Anomaly Detection with Artificial Neural Networks" [3].…”
Section: Introductionmentioning
confidence: 99%