2019
DOI: 10.1007/978-3-030-21548-4_24
|View full text |Cite
|
Sign up to set email alerts
|

Dimensionality Reduction and Visualization of Network Intrusion Detection Data

Abstract: Nowadays, network intrusion detection is researched extensively due to increasing global network threats. Many researchers propose to incorporate machine learning techniques in network intrusion detection systems since these techniques allow for automated intrusion detection with high accuracy. Furthermore, dimensionality reduction techniques can improve the performance of machine learning models, and as such, are widely used as a pre-processing step. Nevertheless, many researchers consider machine learning te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 19 publications
(36 reference statements)
0
6
0
Order By: Relevance
“…The direction, inter-packet length, and inter-arrival times are the most important properties in the flow-based feature formulation: total duration (dur) and destination-to-source-time-to-live (dttl) are two examples of flow-based features. The features are categorized into three sets, namely basic (6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18), content (19)(20)(21)(22)(23)(24)(25)(26), and time (27)(28)(29)(30)(31)(32)(33)(34)(35). Features 36-40 and 41-47 are labeled as general-purpose features and connection features, respectively.…”
Section: Unsw-nb15 Datasetmentioning
confidence: 99%
See 2 more Smart Citations
“…The direction, inter-packet length, and inter-arrival times are the most important properties in the flow-based feature formulation: total duration (dur) and destination-to-source-time-to-live (dttl) are two examples of flow-based features. The features are categorized into three sets, namely basic (6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18), content (19)(20)(21)(22)(23)(24)(25)(26), and time (27)(28)(29)(30)(31)(32)(33)(34)(35). Features 36-40 and 41-47 are labeled as general-purpose features and connection features, respectively.…”
Section: Unsw-nb15 Datasetmentioning
confidence: 99%
“…The UNSW-NB15 is one of the popular [14][15][16][17] and comprehensive cybersecurity datasets released in 2015. 18,19 This dataset is comprised of 2 540 044 realistic modern normal and abnormal (also known as an attack) network activities.…”
Section: Unsw-nb15 Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…Ideally, we would like to extract the features automatically for different datasets. The two most widely used automatic feature extraction methods are principal component analysis (PCA) and autoencoder (AE) [5] . Furthermore, the training process for both methods does not require labels, which solves the problem of manual labeling caused by the huge network traffic.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of capable AI-driven IDS/IPS technologies, there have been various studies investigating and developing data-driven methods. Besides the data analytics and pattern presentations using traditional visualization techniques [3] and unsupervised K-means clustering [4] , the method toward detecting attacks can be mainly divided into two parts, the classical machine learning classifiers and deep learning models. In classical learning methods, several classifiers are utilized and modified for binary and multi-class intrusion detection tasks [5]- [8], including basic tree methods, Multilayer Perceptron, and Support Vector Machine, Naive Bayes, Random Forest, and a sophisticated variant of boost-based classifiers.…”
Section: Introductionmentioning
confidence: 99%