2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2016
DOI: 10.1109/dasc-picom-datacom-cyberscitec.2016.32
|View full text |Cite
|
Sign up to set email alerts
|

Attack Detection in Cloud Infrastructures Using Artificial Neural Network with Genetic Feature Selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…Various methods have been proposed in the literature for network anomaly detection including standard machine learning classifiers 4–29 and deep learning techniques 30–47 . Muda et al performed clustering before classification and compared the single classifiers with hybrid classifiers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Various methods have been proposed in the literature for network anomaly detection including standard machine learning classifiers 4–29 and deep learning techniques 30–47 . Muda et al performed clustering before classification and compared the single classifiers with hybrid classifiers.…”
Section: Related Workmentioning
confidence: 99%
“…Gharaee and Hossein developed genetic based support vector machines and obtained 99.05%, 99.95%, 99.06%, 98.25%, and 100% accuracy for attack types Normal, Probe, DOS, U2R, and R2L, respectively, using KDDCup99 dataset 20 . Guha et al developed an ensemble method that combines artificial neural networks with genetic algorithm and obtained 91.98% accuracy rate on two large datasets 21 . Wheelus et al showed that the pre‐processing of datasets to address class imbalance does indeed provide some benefit using UNSW‐NB15 dataset 23 .…”
Section: Related Workmentioning
confidence: 99%
“…In [13], a standard neural network (abbreviated as NN) has been used to classify attacks and genetic algorithm for feature selection. The similar features are classified into feature sets, and accuracy of each set is measured by multi-modal neural network (abbreviated as MNN).…”
Section: Related Workmentioning
confidence: 99%
“…In the literature, feature selection techniques have been utilised to obtain and use just the more significant attributes without affecting their semantics, but this is beyond the scope of this paper. For simplicity, this work assumes the following four features are returned by a certain feature selection process, which have also been utilised in [3], [24]:…”
Section: A Feature Selection and Fuzzificationmentioning
confidence: 99%