2012
DOI: 10.1007/s00521-012-1263-0
|View full text |Cite
|
Sign up to set email alerts
|

Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(29 citation statements)
references
References 84 publications
0
29
0
Order By: Relevance
“…K-Map is useful for distinction of the data but it is not supported for large volume of data. Support Vector Machine (SVM) [19][20][21][22][23] [ [25][26][27][28][29][30][31][32]: is beneficial for classification and reformation of data, but at the same time SVM only cannot powerfully in recognizing about new data. Given a set of trained-data-set which require more computational time for big-data [4,12].…”
Section: B Related Workmentioning
confidence: 99%
“…K-Map is useful for distinction of the data but it is not supported for large volume of data. Support Vector Machine (SVM) [19][20][21][22][23] [ [25][26][27][28][29][30][31][32]: is beneficial for classification and reformation of data, but at the same time SVM only cannot powerfully in recognizing about new data. Given a set of trained-data-set which require more computational time for big-data [4,12].…”
Section: B Related Workmentioning
confidence: 99%
“…Classification-based anomaly detection methods assume that a classifier that can distinguish between normal and anomalous classes, can be learnt in the given feature space. According to the different ways of training the classifier, classification-based anomaly detection approaches consist of rule-based approaches [20,30,35], neural network-based approaches [31,32], Bayesian networkbased approaches [5,10,14,23], and support vector machine-based approaches [19,33]. -Nearest neighbor-based.…”
Section: Related Workmentioning
confidence: 99%
“…The mass with minimum MSE will be the best. Training is finished if it achieves an acceptable error or maximum number of iterations [22].…”
Section: Proposed Flow Anomaly Detection Systemmentioning
confidence: 99%
“…The results show that GSA outperforms PSO and gradient based algorithms. Also, a Modified GSA (MGSA) is employed in [22] to optimize the interconnection weights of a neural network anomaly detector. The results confirm that MGSAbased method can monitor flow traffic in high speed networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation