2018
DOI: 10.1007/978-3-319-99807-7_20
|View full text |Cite
|
Sign up to set email alerts
|

A Two-Stage Classifier Approach for Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
30
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(30 citation statements)
references
References 16 publications
0
30
0
Order By: Relevance
“…Zong et al [28] proposed an IDS using a two-stage (TS) classifier model based on the RF classifier. The Information Gain (IG) method was used to select the attributes required for the binary classification process.…”
Section: Related Workmentioning
confidence: 99%
“…Zong et al [28] proposed an IDS using a two-stage (TS) classifier model based on the RF classifier. The Information Gain (IG) method was used to select the attributes required for the binary classification process.…”
Section: Related Workmentioning
confidence: 99%
“…A decision tree is used to evaluate the reduced feature set, obtaining 81.42% and 6.39% for accuracy and false alarm rate, respectively. A traditional ensemble approach, i.e., bagging (J48), and random forest for anomaly-based IDS are discussed in [25] and [51], respectively. Similar to [48], since the proposed classifiers are applied only on a single dataset (UNSW-NB15) the generalizability of the proposed methods is still debatable.…”
Section: Related Workmentioning
confidence: 99%
“…Their method was reported to achieve high network intrusion detection performance. In addition, a two-stage approach for network intrusion detention has also been proposed, where different machine learning models can be used in the different stages [18]. An advantage of this approach is that it can deal with the extremely imbalanced characteristics of network intrusion datasets.…”
Section: Related Workmentioning
confidence: 99%
“…The first step was to extract data from the original datasets. NSL KDD and UNSW-NB15 are known as imbalanced datasets, because they contain minor classes that only occupy a relatively small proportion of the dataset, whereas the remainder of the dataset consists of major classes [18]. For example, worm attacks in the UNSW-NB15 occupy < 1% of the dataset, similarly U2R attacks in the NSL KDD only represents a minor portion of the dataset.…”
Section: Proposed Approachmentioning
confidence: 99%