2018
DOI: 10.1007/978-981-13-1747-7_66
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection by Using CFS Subset and Neural Network with WEKA Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 8 publications
0
5
0
1
Order By: Relevance
“…Waikato Environment for Knowledge Analysis (Weka) is an open source ML and data mining software which assembled many ML algorithms capable of mining data [54]- [58]. Weka is a flexible tool in which we can integrate our own algorithms and even borrow his algorithms to implement visualization tools.…”
Section: Classification Methodsmentioning
confidence: 99%
“…Waikato Environment for Knowledge Analysis (Weka) is an open source ML and data mining software which assembled many ML algorithms capable of mining data [54]- [58]. Weka is a flexible tool in which we can integrate our own algorithms and even borrow his algorithms to implement visualization tools.…”
Section: Classification Methodsmentioning
confidence: 99%
“…Randomly initialize velocity Vid (4) End For (5) (6) While ((t <= M) and (particle fitness value < 100)) do (7) For each particle i do (8) Calculate particle fitness value (9) If its fitness value > Pbestid (10) Set Pbestid = fitness value (11) End If (12) End For (13) Set Gbest = the best ever fitness value (14) For particle i=0 to N do (15) For feature d=0 to D do…”
Section: Hybrid Methodologiesmentioning
confidence: 99%
“…IDS for a cloud environment was revised to point out the drawbacks and features of each IDS system based on cloud characteristics [17]. In [23], a multilayer perceptron along with feature selection is used to develop an anomaly-based intrusion detection system. The developed IDS is based on an enhanced correlation-based feature selection (CFS), which identifies anomalies at early stages, and improves detection accuracy.…”
Section: Intrusion Detection (Id)mentioning
confidence: 99%