2015
DOI: 10.1016/j.knosys.2015.01.009
|View full text |Cite
|
Sign up to set email alerts
|

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
177
0
2

Year Published

2017
2017
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 407 publications
(180 citation statements)
references
References 35 publications
(20 reference statements)
0
177
0
2
Order By: Relevance
“…One of its influential application is for developing efficient intrusion detection systems (e.g. [2], [22], [5]- [8]). Om H et al [23], offered a hybrid model that combines k-Means and two classifier methods: k-nearest neighbor and Naive Bayes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…One of its influential application is for developing efficient intrusion detection systems (e.g. [2], [22], [5]- [8]). Om H et al [23], offered a hybrid model that combines k-Means and two classifier methods: k-nearest neighbor and Naive Bayes.…”
Section: Related Workmentioning
confidence: 99%
“…Methods that are based on integrating and combining different techniques are showing better results. In this paper our focus is on an already existing method named CANN which is using k-MEANS clustering along with KNN classifier [8].our goal is to improve KNN classifier performance to increase accuracy and detection rate and reduce false alarm rate of this method. in order to achieve this objective, we involved another effective factor in addition to nearest neighbor(KNN) to our classification process, that factor is farthest neighbor and we named this technique k farthest neighbor or k-FN.…”
Section: Introductionmentioning
confidence: 99%
“…There is also a drive to design hybrid systems that can leverage the computing power of the CPU and GPU for the purpose of accelerating network intrusion detection [1] [11]. Parallel implementations of clustering algorithms have been used before to detect malicious behaviour on the network and in antivirus software [13]. The framework presented in this paper is designed in a versatile manner and can benefit from the extra computing power available in a common GPU.…”
Section: Parallelismmentioning
confidence: 99%
“…In our previous work [1,2], we proposed an advanced incident response framework whose main goal is to identify more dangerous IDS alerts [3][4][5][6][7][8][9][10][11][12] using the darknet traffic. In addition, we carried out a practical correlation analysis of IDS alerts and the darknet traffic, focusing on internal hosts that sent packet(s) to the darknet and showed how security operators are able to effectively identify internal attack hosts using the darknet traffic [13].…”
Section: Introductionmentioning
confidence: 99%