2017
DOI: 10.1016/j.knosys.2017.09.014
|View full text |Cite
|
Sign up to set email alerts
|

An effective intrusion detection framework based on SVM with feature augmentation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
81
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 229 publications
(88 citation statements)
references
References 39 publications
0
81
0
1
Order By: Relevance
“…It was used and designed by Guang-Bin-Huang. Extreme Learning machines are timber move forward neural networks for grouping, fading, clustering, sparse approximation, compression and feature Sophistication with a single layer or multiple layers of guarded nodes, where the parameters of adjacent to nodes (not just the weights connecting inputs to hidden nodes) need not be tuned [1] [2]. These hidden nodes can be assigned randomly and not at all updated (i.e.…”
Section: Machinementioning
confidence: 99%
See 1 more Smart Citation
“…It was used and designed by Guang-Bin-Huang. Extreme Learning machines are timber move forward neural networks for grouping, fading, clustering, sparse approximation, compression and feature Sophistication with a single layer or multiple layers of guarded nodes, where the parameters of adjacent to nodes (not just the weights connecting inputs to hidden nodes) need not be tuned [1] [2]. These hidden nodes can be assigned randomly and not at all updated (i.e.…”
Section: Machinementioning
confidence: 99%
“…All the algorithms discussed by wang et al [2],kuang et al [4],Aburomman[5],Fernaaz and Jabbar [8],to improve the performance of intrusion detection systems. These intrusion discovery calculations (for example SVM,ELM) which are executed utilizing appropriated structures like Jupyter to process bigger informational collections.The algorithms is executed dependent on wang.et.al [1] proposed an interruption identification structure dependent on SVM and approve their strategy on the NSL-KDD informational dataset.…”
Section: Related Workmentioning
confidence: 99%
“…IDS detects whether there is an attack behavior in the network and immediately performs response processing. Recently, a large number of techniques are applied to intrusion detection, such as rule-based network intrusion detection technology [8], artificial immune system [9], clustering-based technology [10,11], Support Vector Machine (SVM) [12,13], neural network [14][15][16], etc. Currently, among many intrusion detection algorithms, neural network-related algorithms have been widely used because of their good robustness and adaptability.…”
Section: Introductionmentioning
confidence: 99%
“…obtain the new train data D = {y k , t k } 6: generate w i and b i randomly, set the number of hidden neurons L 7: calculate the output of hidden neurons H according to the Equation (13) 8: calculate the output weight of classifier β according to the Equation (14) 9: formulate the feature matrix X t for DT 10: X t = Z − score(X t ) 11: Y t = X t A * 12: calculate the output of hidden neurons H t for test data according to the Equation (13) 13: T = H t β according to the Equation(12) …”
mentioning
confidence: 99%
“…Bearing is the important component of mechanical equipment, and the reliable fault diagnosis method of bearing is key to ensuring its safe operation, which is helpful to safe operation of mechanical equipment [1][2][3][4][5][6][7][8][9]. Support vector machine (SVM) classifier [10][11][12] has a good ability to solve the classification problems, which has been applied in fault diagnosis of bearing [13]. Relevance vector machine (RVM) based on sparse Bayesian framework has a sparser representation than SVM, which has a better application prospect in fault diagnosis of bearing.…”
Section: Introductionmentioning
confidence: 99%