2011
DOI: 10.1016/j.eswa.2010.06.066
|View full text |Cite
|
Sign up to set email alerts
|

A novel intrusion detection system based on hierarchical clustering and support vector machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
146
0
7

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 389 publications
(157 citation statements)
references
References 18 publications
(17 reference statements)
0
146
0
7
Order By: Relevance
“…The performance metrics of our proposed IDS are compared with other methods that are presented on other research papers (Table 19 and Table 20). We would like to note that there are some papers that used the KDD Test set with their proposed method [2], [39]- [41], but they included the http-tunnel attack into the U2R class [39], [40]. In fact, the http-tunnel attack is a Remoteto-Local (R2L) attack [26], which intends to gain local access from a remote machine.…”
Section: Hybrid Model and Experimental Resultsmentioning
confidence: 99%
“…The performance metrics of our proposed IDS are compared with other methods that are presented on other research papers (Table 19 and Table 20). We would like to note that there are some papers that used the KDD Test set with their proposed method [2], [39]- [41], but they included the http-tunnel attack into the U2R class [39], [40]. In fact, the http-tunnel attack is a Remoteto-Local (R2L) attack [26], which intends to gain local access from a remote machine.…”
Section: Hybrid Model and Experimental Resultsmentioning
confidence: 99%
“…The basic probability distribution function is defined by (5) and (6). Finally, the combination in (2) is used to combine the modified evidences.…”
Section: )mentioning
confidence: 99%
“…Most of them are based on SVM technology which has a solid theoretical basis and can classify data records into multiple classes. Horng et al [6] proposed an SVM-based intrusion detection system based on a hierarchical clustering algorithm to preprocess dataset before training. The simple feature selection procedure was applied to eliminate unimportant features from the training set so that the obtained SVM model could classify the network traffic data more accurately.…”
Section: Introductionmentioning
confidence: 99%
“…Horng et al [2] Proposed novel intrusion detection on hierarchical clustering and support vector machines. The Hierarchical clustering algorithm is used to obtain fewer, abstracted, and higher-qualified training instances from the KDD 99 dataset.…”
Section: Related Workmentioning
confidence: 99%