2021 IEEE International Systems Conference (SysCon) 2021
DOI: 10.1109/syscon48628.2021.9447092
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The value of q is determined using the Poisson distribution, utilizing the ratio between the size of the largest class and the size of the current data point's class as the value of šœ† argument in the Poisson distribution. The šœ† parameter of the Poisson distribution is computed for an instance of class i as follows: šœ† = Size maj Size i (7) where Size maj denotes the size of the majority class, and Size i denotes the size of class i. Consequently, the probability of replication is higher for instances of minority classes, while it is lower for instances of majority classes.…”
Section: Rarity Updated Ensemble With Oversamplingmentioning
confidence: 99%
See 2 more Smart Citations
“…The value of q is determined using the Poisson distribution, utilizing the ratio between the size of the largest class and the size of the current data point's class as the value of šœ† argument in the Poisson distribution. The šœ† parameter of the Poisson distribution is computed for an instance of class i as follows: šœ† = Size maj Size i (7) where Size maj denotes the size of the majority class, and Size i denotes the size of class i. Consequently, the probability of replication is higher for instances of minority classes, while it is lower for instances of majority classes.…”
Section: Rarity Updated Ensemble With Oversamplingmentioning
confidence: 99%
“…On average, the proposed RUEO method performed better than all baseline algorithms on the real-world data in terms of both average-accuracy and G-Mean. Compared with synthetic data streams, real-world data streams better represent the fundamental challenges of data stream classification, including concept drift, a large number (3) 0.61 (7) 0.59 (9) 0.59 (11) 0.59 (10) of classes, and class imbalance. This has made the distinction between different ensemble classification algorithms more recognizable.…”
Section: Evaluation On Real-world Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…Yubo Zhai et al [29] proposed the use of random forest for intrusion detection with a 98% detection rate. Admilson de Ribamar Lima Ribeiro et al [30] used the OutlierDenStream algorithm for intrusion detection under SDN with an accuracy of 97.83%. However, it was only for DDoS attacks and did not have a strong generalization capability.…”
Section: Related Workmentioning
confidence: 99%
“…The existing Cuda-Deep Neural Network (DNN)-Gated Recurrent Unit (GRU), i.e., Cu-DNNGRU and Cuda-bidirectional LSTM (Cu-BLSTM) methods, were implemented for an effectual threat detection outcome. Ribeiro et al [16] introduced an anomaly-related technique that employed the ML approaches over continuous data streams for the purpose of identifying intrusions in the SDN-enabled IoT atmosphere. In order to characterize the anomalies, the author examined structure assault, a type of DDoS assault.…”
Section: Introductionmentioning
confidence: 99%