2018
DOI: 10.1007/978-981-13-1810-8_37
|View full text |Cite
|
Sign up to set email alerts
|

Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(29 citation statements)
references
References 10 publications
0
29
0
Order By: Relevance
“…Although the multi-class classification performance of our proposed method has been proven through experiments, to provide more reference for the readers, we still compare the results of our CFS-BA-Ensemble method with other earlier researches in binary classification based on NSL-KDD, AWID, and CIC-IDS2017 datasets, which is shown in Table 13. First of all, it can be seen in Table 13 that our proposed model outperforms other similar ensemble classifiers, such as FS-EL [83], XGBoost-IDS [13], and TSE-IDS [82] when using 10f cross-validation as a validation technique. There are also some deep learning methods for IDS in the current literature such as DEMISe [69], DeepWindow [79], and HELAD [99].…”
Section: Comparison With the State Of The Art Methodsmentioning
confidence: 86%
“…Although the multi-class classification performance of our proposed method has been proven through experiments, to provide more reference for the readers, we still compare the results of our CFS-BA-Ensemble method with other earlier researches in binary classification based on NSL-KDD, AWID, and CIC-IDS2017 datasets, which is shown in Table 13. First of all, it can be seen in Table 13 that our proposed model outperforms other similar ensemble classifiers, such as FS-EL [83], XGBoost-IDS [13], and TSE-IDS [82] when using 10f cross-validation as a validation technique. There are also some deep learning methods for IDS in the current literature such as DEMISe [69], DeepWindow [79], and HELAD [99].…”
Section: Comparison With the State Of The Art Methodsmentioning
confidence: 86%
“…Han et al have used Wasserstein Generative Adversarial Network (WGAN) [56] to process data for traffic, nevertheless, models based on Generative Adversarial Network (GAN) requires a very long training time and the model is very hard to train as well. Many scholars used GBDT to deal with network traffic [37]- [41], and get a great result. Hao et al [34] and Xu et al [35] used GRU to utilize the temporal relationship of network flow, however, GRU is a version of RNN model which focuses on the inner long-term temporal relationship in dataflow but have a relatively poor ability to catch spatial information.…”
Section: Related Work a Intrusion Detection Techniquesmentioning
confidence: 99%
“…In recent years, with the prosperity and development of machine learning techniques, more and more researcher try to use machine learning method to deal with IDS problem [13]- [16]. Lots of scholars have used Support Vector Machine (SVM) [17]- [19], Convolutional Neural Network (CNN) [20]- [23], Recurrent Neural Network (RNN) [24], [25], Long Short-Term Memory (LSTM) [26]- [30],Gated Recurrent Unit (GRU) [34]- [36], ensemble learning method [31]- [33],especially Gradient Boosting Decision Tree (GBDT) [37]- [41] and many other kinds of machine learning meth-ods in IDS. Those methods have efficiently improved the classification accuracy.…”
Section: Introductionmentioning
confidence: 99%
“…They adopted both training/testing model and 10-fold cross-validation model for regression and classification. Bansal et al [11] observed the performance of XGBoost on intrusion detection system. They compared the efficiency of XGBoost with AdaBoost, Naïve Bayes, multilayer perceptron (MLP), and K-nearest neighbor classification methods.…”
Section: Related Workmentioning
confidence: 99%