2019 Third International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac) 2019
DOI: 10.1109/i-smac47947.2019.9032499
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Intrusion Detection System using Machine Learning Classification Algorithm based on different feature selection approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…This section recalls the works [7][8][9][10][11][12][13][14][15][16][17][18][19][20] from which inspiration was taken for the application of ML models and to make a comparison between the state-of-the-art results and the results achieved by the techniques we presented in the next sections.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This section recalls the works [7][8][9][10][11][12][13][14][15][16][17][18][19][20] from which inspiration was taken for the application of ML models and to make a comparison between the state-of-the-art results and the results achieved by the techniques we presented in the next sections.…”
Section: Related Workmentioning
confidence: 99%
“…In [10], a very detailed investigation is reported for observing several issues on the intrusive performance by using the ML classification. Here, an ML-classification algorithm is used for detecting the several categories of attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning is used for autonomous real-time anomaly detection in this work. Usage of machine learning classifiers for intrusion and anomaly detection for network security is thoroughly researched in the past decade [27], [28]. The classifiers studied in this paper include:…”
Section: Machine Learning Techniques For Autonomous Anomaly Detectionmentioning
confidence: 99%
“…DT, KNN and GNB classifiers are preferred due to their suitability for intrusion and anomaly detection [28], [29]. RF and Stacking classifiers are also included in this paper because they perform relatively well on the IoTID20 data as presented in [26].…”
Section: Machine Learning Techniques For Autonomous Anomaly Detectionmentioning
confidence: 99%
“…A KY(Buck-boost)Converter To Analysing The Hybrid System Generating Higher Output [10][11].This Paper Presents An Advanced Consolation Of Hybrid System So That Demand For More Power Generation Could Be Fulfilled [12]. To Optimize The Energy utilization According the power availability and load profile For this applications the intelligent Controller Determines the utilization of Multisource Energy System [13]- [15].…”
Section: Introductionmentioning
confidence: 99%