2020
DOI: 10.1007/s12652-020-02628-1
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-based network intrusion detection with ensemble classifiers and meta-heuristic scale (ECMHS) in traffic flow streams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…Their application of autoencoders with the Modbus TCP protocol yielded an impressive F1 score of 98.36%. Similarly, [11][12][13] introduced an unsupervised Attention-based ConvLSTM Autoencoder with a Dynamic Thresholding (ACLAE-DT) framework for handling multivariate time series anomalies. By processing the data and creating feature images, they utilized an attention-based ConvLSTM autoencoder to discern temporal behaviors, achieving AD through dynamic thresholding of reconstruction errors [14][15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Their application of autoencoders with the Modbus TCP protocol yielded an impressive F1 score of 98.36%. Similarly, [11][12][13] introduced an unsupervised Attention-based ConvLSTM Autoencoder with a Dynamic Thresholding (ACLAE-DT) framework for handling multivariate time series anomalies. By processing the data and creating feature images, they utilized an attention-based ConvLSTM autoencoder to discern temporal behaviors, achieving AD through dynamic thresholding of reconstruction errors [14][15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The HC idea was to incorporate the MFO technique for enhancing the convergence rates. In [20], an MH association scale can be devised for extracting threshold values for the transaction and ensemble classifications can be employed for analyzing the transaction as attack or normal. In the presented mechanism Ensemble classifier was utilized depending on drift identification having the capability for examining the requests at stream levels.…”
Section: Related Workmentioning
confidence: 99%
“…The metaclusterer filtered clusterer algorithm permits to apply the filter before clusrerer is been learnt. The training data form the shape of the structure clusterer while the test data processed by using the filter without affecting the structure [67]. All these algorithms are implementing with the dataset with all features after applying SMOTE filter and observing the performance accuracy.…”
Section: Model Implementationmentioning
confidence: 99%