2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN) 2015
DOI: 10.1109/icscn.2015.7219853
|View full text |Cite
|
Sign up to set email alerts
|

Comparative study of Principal Component Analysis based Intrusion Detection approach using machine learning algorithms

Abstract: This paper induces the prominence of variegated machine learning techniques adapted so far for the identifying different network attacks and suggests a preferable Intrusion Detection System (IDS) with the available system resources while optimizing the speed and accuracy. With booming number of intruders and hackers in todays vast and sophisticated computerized world, it is unceasingly challenging to identify unknown attacks in promising time with no false positive and no false negative. Principal Component An… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 8 publications
0
8
0
1
Order By: Relevance
“…In this system, the detection stage relies on the major principal component score and the minor principal component score. In addition, PCA has been used in intrusion detection techniques based on payload modeling, statistical modeling, data mining and machine learning [56][57][58].…”
Section: Idss: Detection Techniquesmentioning
confidence: 99%
“…In this system, the detection stage relies on the major principal component score and the minor principal component score. In addition, PCA has been used in intrusion detection techniques based on payload modeling, statistical modeling, data mining and machine learning [56][57][58].…”
Section: Idss: Detection Techniquesmentioning
confidence: 99%
“…Chabathula et. al in [37] have made an experiment on the effect of dimensionality reduction with PCA on different machine learning algorithms like…”
Section: Existing Approaches To Idsmentioning
confidence: 99%
“…PCA can also be used for feature reduction [31] and feature selection [32]. In addition, PCA can be combined with machine learning methods such as SVM [33], genetic algorithm [34] and naïve bayes [35]. Chen et al [36] using the Multi-Scale Principal Component Analysis (MSPCA) to identify the Denial of Service (DoS) attacks.…”
Section: Introductionmentioning
confidence: 99%