2018
DOI: 10.1002/spy2.36
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive anomaly‐based intrusion detection system using genetic algorithm and profiling

Abstract: Intrusion detection systems have been playing an important role in defeating treats in the Cyberspace. In this context, researchers have been proposing anomaly-based methods for intrusion detection, on which the "normal" behavior is defined and the deviations (anomalies) are pointed out as intrusions. In this case, profiling is a relevant procedure used to establish a baseline for the normal behavior. In this work, an adaptive approach based on genetic algorithm is used to select features for profiling and par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…Resende and Drummond [75] strongest features and weakest features were combined into a new feature N1 and N2, respectively. The features were trained with various Machine Learning classifiers with Principal Components Analysis.…”
Section: Network Intrusionmentioning
confidence: 99%
“…Resende and Drummond [75] strongest features and weakest features were combined into a new feature N1 and N2, respectively. The features were trained with various Machine Learning classifiers with Principal Components Analysis.…”
Section: Network Intrusionmentioning
confidence: 99%
“…However, even if works that use the CICIDS2017 dataset exist, many of them are not specially designed to provide effective and efficient IDS systems against DoS attacks. Most of the research works conducted using this dataset are driven by other motivations which can be providing online detection [14], enhancing the performance of some ML classifiers [15][16][17], checking the efficiency of some feature selection algorithms, to provide anomaly detection [18], or meeting other objectives [11,13]. Some of them focus on providing an IDS system to detect all the attacks found in the datasets.…”
Section: Statement Of the Problem Even Ifmentioning
confidence: 99%
“…We note that this dataset is commonly used in the evaluation of anomaly detection approaches with the learning stage performed on the first day [60], [61]. However, a few recent studies have considered these data also in the evaluation of classification approaches, as we do in this paper [36], [56], [62].…”
Section: A Dataset Descriptionmentioning
confidence: 99%