2017 International Conference on Computer, Information and Telecommunication Systems (CITS) 2017
DOI: 10.1109/cits.2017.8035323
|View full text |Cite
|
Sign up to set email alerts
|

An effective semi-supervised model for intrusion detection using feature selection based LapSVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 11 publications
0
4
0
1
Order By: Relevance
“…LoRa transmitter akan merubah data real menjadi data string untuk mengirimkan data string ke receiver. Dari data receiver akan mengirimkan ke Arduino 2 untuk memperoses data string yang akan dikirimkan ke Get web server melalui ESP 32 [12]. Dari data web server akan diproses ke aplikasi dan ke lcd untuk menapilkan nilai dari sensor suhu dan kelembapan tanah.…”
Section: Desain Perancangan Sistemunclassified
“…LoRa transmitter akan merubah data real menjadi data string untuk mengirimkan data string ke receiver. Dari data receiver akan mengirimkan ke Arduino 2 untuk memperoses data string yang akan dikirimkan ke Get web server melalui ESP 32 [12]. Dari data web server akan diproses ke aplikasi dan ke lcd untuk menapilkan nilai dari sensor suhu dan kelembapan tanah.…”
Section: Desain Perancangan Sistemunclassified
“…It is well recognized that because there is no set pattern for monitoring, aberrant intrusions are exceedingly challenging to find. An occurrence is typically deemed abnormal if it occurs considerably more frequently or less frequently than a threshold [9]. Some AI methods employ tree-based algorithms like decision trees and random forests, which can build a structure for successfully detecting infiltration.…”
Section: Related Workmentioning
confidence: 99%
“…The authors [1] developed a system that used LapSVM to integrate labeled and unlabeled data to improve classification results. The research gap is that the approach requires more memory and processing speed.…”
Section: Related Workmentioning
confidence: 99%
“…1. Network Intrusion Detection System [NIDS] [1][2]: The NIDS structure or service must be deployed within the system architecture, and it can be launched in one or more locations. In the system It searches for and analyses incoming and outgoing traffic to and from aforementioned system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation