2018
DOI: 10.1007/s12559-018-9564-y
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(27 citation statements)
references
References 31 publications
0
25
0
2
Order By: Relevance
“…Probabilistic-based Methods. Conventional probabilistic methods [12]- [16], [40], [41] model the inliers' features' distributions, where the outliers are detected as samples with low probability. Several approximations to the true distribution of the data have been proposed, for instance, Genetic programming [42] to estimate a kernel density function, minimum-volume-sets to estimate a particular level set of the unknown nominal multivariate density [43], or constructing minimal graphs covering a K-point subset to estimate the critical region [44], [45].…”
Section: Related Workmentioning
confidence: 99%
“…Probabilistic-based Methods. Conventional probabilistic methods [12]- [16], [40], [41] model the inliers' features' distributions, where the outliers are detected as samples with low probability. Several approximations to the true distribution of the data have been proposed, for instance, Genetic programming [42] to estimate a kernel density function, minimum-volume-sets to estimate a particular level set of the unknown nominal multivariate density [43], or constructing minimal graphs covering a K-point subset to estimate the critical region [44], [45].…”
Section: Related Workmentioning
confidence: 99%
“…The use of ELM for IDS was also used with probabilistic algorithms. This is shown in the work of [1], where a probability density function is learned based on flow features for frequent communications. The authors have used a hierarchical heavy hitters' algorithm for clustering network statistics and learning the probability density function of each feature using ELM.…”
Section: Literature Surveymentioning
confidence: 99%
“…Intrusion detection is the task of observing, analysing and identifying activities aiming to violate a network's security policy. The key success factor for identifying such activities relies on an appropriate monitoring of the network by diagnosing its usage chronically [1]. In the past, organisations used specific authentication policies articulating various levels of accessing.…”
Section: Introductionmentioning
confidence: 99%
“…35 Knowledge representation is of great significance to modern science. In many fields, it has been regarded as the main driving force for the application of theory to practice, such as, aggregation, 36 evidence resolution, [37][38][39] decision-making [40][41][42] and so on. [43][44][45] Interestingly, probability is similar to coins, it also has a original side and a negative side.…”
Section: Gini Entropymentioning
confidence: 99%