Proceedings of the Second International Conference on Internet of Things, Data and Cloud Computing 2017
DOI: 10.1145/3018896.3065830
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of ensemble learning methods applied to network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 18 publications
0
6
0
1
Order By: Relevance
“…It has fast learning speed and high accuracy [18]. Both bagging and boosting methods were used on UNSW-NB15 dataset to demonstrate the performance of classifier-based intrusion detection systems [19]. In this comparative analysis, boosting method performed better than the bagging method by significantly reducing the number of false positives.…”
Section: Machine Learning and Cybersecuritymentioning
confidence: 99%
“…It has fast learning speed and high accuracy [18]. Both bagging and boosting methods were used on UNSW-NB15 dataset to demonstrate the performance of classifier-based intrusion detection systems [19]. In this comparative analysis, boosting method performed better than the bagging method by significantly reducing the number of false positives.…”
Section: Machine Learning and Cybersecuritymentioning
confidence: 99%
“…Acurácia F1-Score Precision Recall [Milliken et al 2015] 0.98 [Belouch and hadaj 2017] 0.8572 [Sun et al 2018] 0.5727 [Lu et al 2019] 0.7076 [Hsu et al 2019] 0.9175 0.931 0.921 [Olasehinde et al 2020] 0.9856 [Tama et al 2020] 0.9604 Este trabalho 0.9992 0.999 0.9995 0.9995…”
Section: Propostamentioning
confidence: 99%
“…Belouch and hadaj 2017] realizaram uma comparac ¸ão entre três técnicas diferentes de Ensemble: Booting, Bagging e Stacking. Os autores combinaram quatro diferentes classificadores: Decision Tree, Naive Bayes, Multilayer Perceptron e REPTree.…”
unclassified
“…Today, machine learningbased intrusion detection technology is a promising solution to the problems. When machine learning, which has recently received much attention, is used to detect network attacks, it not only greatly reduces the need for intervention by administrators, but it also effectively responds to variant attacks or zero-day attacks by automating the task of extracting and utilizing the behavior patterns of the attacks [4]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is impossible to perform packet-by-packet processing in real time while satisfying delay conditions with existing slow machine learning algorithms. Because of this limitation, today's machine learning-based security systems only monitor statistical characteristic values for each session, instead of detecting per-packet attacks, and they just determine whether a network attack exists after the session ends [3]- [8].…”
Section: Introductionmentioning
confidence: 99%