Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence 2009
DOI: 10.1145/1654988.1655002
|View full text |Cite
|
Sign up to set email alerts
|

Active learning for network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
32
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(34 citation statements)
references
References 22 publications
1
32
0
Order By: Relevance
“…Semi-supervised SVDD has no open source implementation, so we have implemented it for our experiments with the information provided in [12][13][14]. The parameters c, r, and the margin γ ∈ R are determined with the quasi-Newton optimization method BFGS [46] available in scipy [17].…”
Section: Labelling Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Semi-supervised SVDD has no open source implementation, so we have implemented it for our experiments with the information provided in [12][13][14]. The parameters c, r, and the margin γ ∈ R are determined with the quasi-Newton optimization method BFGS [46] available in scipy [17].…”
Section: Labelling Strategiesmentioning
confidence: 99%
“…We have set η U and η L to the inverse of the number of unlabelled and labelled instances, to give as much weight to unlabelled and labelled instances, and to ensure numerical stability. The detection model is trained without any kernel as in the experiments presented in [12][13][14].…”
Section: Labelling Strategiesmentioning
confidence: 99%
“…To reduce the effort of generating training data, Görnitz et al [74] redefine anomaly detection as an active learning task that queries an expert when detection confidence is insufficient. The proposed learning setting is intended for techniques such as PAYL, Anagram, or McPAD.…”
Section: Anomaly Detection In Network Packet Headers and Payloadsmentioning
confidence: 99%
“…To reduce the labeling effort, Grnitz et al [58] proposed an effective active learning strategy to query low-confidence observations in intrusion detection. With Support Vector Domain Description (SVDD) [59], it queries instances that are not only close to the boundary of the hypersphere but also likely members of novel rejection categories.…”
Section: A Active Learning In Intrusion Detectionmentioning
confidence: 99%