2017
DOI: 10.1016/j.future.2016.12.040
|View full text |Cite
|
Sign up to set email alerts
|

CLAPP: A self constructing feature clustering approach for anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 68 publications
(24 citation statements)
references
References 23 publications
0
24
0
Order By: Relevance
“…Zolanvari et al (2019) demonstrates their model by deploying backdoor, command injection and structured query language injection attacks and proved their machine learning model performed well against anomalies. In Gunupudi, Nimmala, Gugulothu, and Gali (2017), a self‐constructing feature clustering technique that applies a Gaussian membership function to anomaly detection in IoT network is proposed. A Gaussian dissimilarity measure Aljawarneh and Vangipuram (2018) is proposed to perform similarity computation for anomaly detection in IoT environment.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Zolanvari et al (2019) demonstrates their model by deploying backdoor, command injection and structured query language injection attacks and proved their machine learning model performed well against anomalies. In Gunupudi, Nimmala, Gugulothu, and Gali (2017), a self‐constructing feature clustering technique that applies a Gaussian membership function to anomaly detection in IoT network is proposed. A Gaussian dissimilarity measure Aljawarneh and Vangipuram (2018) is proposed to perform similarity computation for anomaly detection in IoT environment.…”
Section: Literature Surveymentioning
confidence: 99%
“…Nguyen et al (2019) proposed a new collaborative and intelligent NIDS architecture for anomaly detection in SDN‐based cloud IoT networks which obtained better detection accuracy results for DDoS attacks. Gunupudi et al (2017) Kumar, Mangathayaru, Narsimha, and Cheruvu (2018) Mangathayaru, Kumar, and Narsimha (2016) Kumar, Mangathayaru, Narsimha, and Reddy (2017) propose self‐constructing feature clustering technique for anomaly detection using Gaussian‐based approach. Li et al (2019) demonstrates system statistics learning‐based IoT security and introduced a neural network classifier algorithm for anomaly detection.…”
Section: Literature Surveymentioning
confidence: 99%
“…It is important to detect the outliers efficiently and accurately to improve the reliability of WSN data. The general outlier detection methods can be classified into four classes: statistical-based methods, [4][5][6] nearest neighbor-based methods, 7,9 clustering-based methods, [10][11][12] and classification-based methods. [13][14][15][16][17] Statistical-based methods capture the distribution of the data and evaluate how well the data instance matches the model.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, collected datasets have high dimensionality and large scalability for certain cases, presenting issues for data processing. In the past several years, numerous methods have been proposed to perform outlier detection for WSNs [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] (reviewed in section ''Related work''). However, the majority of these can only address the first two challenges, and most of them cannot be directly applied to high-dimensional and large-scalability data because of the following issues: 15 (1) time-consuming-as the dimension of the input data vector increases, the number of feature subspaces increases exponentially, which results in an exponential search space; (2) low detection rate-the high proportion of irrelevant features in highdimensional datasets unavoidably include noises, which makes the true outliers inconspicuous; and (3) high false alarm rate-in high-dimensional space, we can always determine at least one feature subspace for each point of a dataset that defines such a point as an outlier, that is, every data instance can be considered as an outlier under a particular circumstance.…”
Section: Introductionmentioning
confidence: 99%
“…Feature selection [1], Feature representation [19], [20] and dimensionality reduction approaches [21]- [23] have been studied and extensively addressed in many research contributions related to text classification, data fusion, image fusion, medical data classification and various machine learning and data mining applications. Feature reduction techniques are also applied for the design of intrusion detection systems (IDS) [19], [20] in the literature. Several studies are also carried on how to choose a right classifier and apply it for building efficient network intrusion detection [1].…”
Section: Introductionmentioning
confidence: 99%