2018 3rd International Conference for Convergence in Technology (I2CT) 2018
DOI: 10.1109/i2ct.2018.8529797
|View full text |Cite
|
Sign up to set email alerts
|

ERCR TV: Ensemble of Random Committee and Random Tree for Efficient Anomaly Classification Using Voting

Abstract: Anomaly Detection is widely used in applications related but not limited to intrusion detection, fault detection, fraud detection, health monitoring systems and many other places. The overall efficiency of these applications depends on the classification algorithm that is chosen. An efficient classification algorithm can thus greatly improve the accuracy of these applications. This paper proposes a hybrid approach involving Random Committee and Random Tree techniques for anomaly classification, resulting in mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…The proposed EKMC performs better than our previous model i.e. ERCRTV [1] and the existing GAA-ADS [8] models when tested on both the data sets. EKMC exhibits good Prediction Accuracy and a better Detection Rate as listed in Table 5 and depicted in Figure 2.…”
Section: Resultsmentioning
confidence: 80%
See 2 more Smart Citations
“…The proposed EKMC performs better than our previous model i.e. ERCRTV [1] and the existing GAA-ADS [8] models when tested on both the data sets. EKMC exhibits good Prediction Accuracy and a better Detection Rate as listed in Table 5 and depicted in Figure 2.…”
Section: Resultsmentioning
confidence: 80%
“…In this extension work [1], we propose SDMR for Feature Selection that exploits the advantages of various existing Weight Based Ranking Algorithms. In addition to SDMR, the data set is also subjected to PCA for dimensionality reduction during the preprocessing stage.…”
Section: Astesj Issn: 2415-6698mentioning
confidence: 99%
See 1 more Smart Citation
“…Initially, The suggested form has been taught and tested using the train set and test set respectively. A tenfold cross-validation was conducted to evaluate performance metrics [4]. The information is either labeled as normal or one of 38 distinct kinds of attacks in the NSL-KDD dataset.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…The rank algorithm for the filter method is used to keep the characteristics from higher priority to least. Compressive classification algorithms are numerous [4], Each with its own strengths and weaknesses. There is no single best-performing learning algorithm, but we selected five of them (innocent Buyers, Random Tree, Random Committee, Decision Table, Random Forest) in our analysis, and will try to find out which algorithm is best suited to the dataset [5].…”
Section: Methodsmentioning
confidence: 99%