2017
DOI: 10.17485/ijst/2017/v10i14/93690
|View full text |Cite
|
Sign up to set email alerts
|

Fast kNN Classifiers for Network Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…The authors of [17,18] use the KNN method as a basis for their cybersecurity methods. In [17], Bilge et al use Indexed Partial Distance Search k-Nearest Neighbor (IKPDS) to test different types of attacks, and it results in an accuracy of 99.6%. Shapoorifard and Shamsinejad in [18] focus on reducing the false alarm rate and show an accuracy of 85.2% [18].…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [17,18] use the KNN method as a basis for their cybersecurity methods. In [17], Bilge et al use Indexed Partial Distance Search k-Nearest Neighbor (IKPDS) to test different types of attacks, and it results in an accuracy of 99.6%. Shapoorifard and Shamsinejad in [18] focus on reducing the false alarm rate and show an accuracy of 85.2% [18].…”
Section: Related Workmentioning
confidence: 99%
“…Tharwat et al (2013), the authors designed and developed three different classifiers based on KNN classifier's concept for facial age estimation to achieve high efficiency. Rao and Swathi (2017) adapted two fast KNN classification algorithms i.e., Indexed Partial Distance Search k-Nearest Neighbor (IKPDS), Partial Distance Search k-Nearest Neighbor (KPDS) and comparing with traditional KNN classification for Network Intrusion Detection on NSL-KDD dataset 2017 (NSL-KDD, 2009). Benaddi et al (2018), the authors propose to use PCA-fuzzy Clustering-KNN method which ensemble of Analysis of Principal Component and Fuzzy Clustering with K-Nearest Neighbor feature selection technics to detect anomalies.…”
Section: Machine Learning Models To Network Anomaly Detectionmentioning
confidence: 99%
“…Experimented with a wide variety of attacks and different k values, Rao et al [8] used Indexed Partial Distance Search k-Nearest Neighbor (IKPDS) to recognize attacks. ey tested their method with 12,597 samples that were randomly selected from the NSL-KDD dataset, resulting in 99.6% accuracy in their experiment.…”
Section: Introductionmentioning
confidence: 99%
“…ST, T, x, N, l, α, where ST is the substitute model, T is the target model, x is the network flow data, N is the iteration steps, l is original label, and α is the move step Output: traffic adversarial example x adv (1) setx adv � x (2) for i ∈ [0, N − 1]do (3) loss L � cross entropy (l, ST(x adv )) (4) gradient G � ▽ x adv L (5) perturbation η � D • (αO(G)),where O(•) is shown in equation (8) (6) set x adv � x adv + η (7) if ST(x adv ) ≠ l and T(x adv ) ≠ l then(8) break (9) end if (10) if x adv � x then(11) break (12) end if (13) end for (14) return x adv ALGORITHM 2: Network flow adversarial example generate algorithm.…”
mentioning
confidence: 99%