2015
DOI: 10.1016/j.procs.2015.03.174
|View full text |Cite
|
Sign up to set email alerts
|

Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
62
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 140 publications
(62 citation statements)
references
References 8 publications
0
62
0
Order By: Relevance
“…For a selected feature space, the hybrid technique reported an accuracy of 100% for DoS and 87.01% for all classes of attacks with a significantly lower false alarm rate. The results represents a good performance for the hybrid approach proposed in [24].…”
Section: Copyright ⓒ 2018 Sersc Australiamentioning
confidence: 57%
See 1 more Smart Citation
“…For a selected feature space, the hybrid technique reported an accuracy of 100% for DoS and 87.01% for all classes of attacks with a significantly lower false alarm rate. The results represents a good performance for the hybrid approach proposed in [24].…”
Section: Copyright ⓒ 2018 Sersc Australiamentioning
confidence: 57%
“…A hybrid approach for anomaly intrusion detection with a prediction module is studied in [24]. One of the key components of multistage attacks is the preponderance of network anomalies, which can populate the network server to the extent of exhausting the available computing resources such as memory, processors, data structures, and storage.…”
Section: Copyright ⓒ 2018 Sersc Australiamentioning
confidence: 99%
“…KSVM [12] 88.71 --NADCP [8] 91 Finally, the algorithm proposed in this paper is compared with several anomaly detection algorithms of the same category, and it is concluded that the algorithm proposed in this paper has obvious advantages in terms of detection performance.…”
Section: Experiments and Results Analysismentioning
confidence: 99%
“…The development and deployment of sensor networks was motivated by defence applications. However, these networks are now used in many application areas, including home automation, healthcare applications, environment and habitat monitoring etc.. A wireless sensor network normally constitutes a ad-hoc network, meaning that each sensor supports a multi-hop routing [17]. Many authentication protocols for WSNs have been proposed for medical applications.…”
Section: Related Workmentioning
confidence: 99%