2020
DOI: 10.1049/iet-com.2019.0502
|View full text |Cite
|
Sign up to set email alerts
|

Improved intrusion detection method for communication networks using association rule mining and artificial neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 28 publications
(32 reference statements)
0
15
0
Order By: Relevance
“…At this time, the malicious data center of gravity in wireless personal communication is the largest, but because of the fluctuation of its peripheral data, the data center of gravity cannot always be kept as the maximum value [14], and the absolute difference between aðρÞ and a + 1ðρÞ therefore needs to be calculated to obtain…”
Section: Construction Of Malicious Intrusion Datamentioning
confidence: 99%
“…At this time, the malicious data center of gravity in wireless personal communication is the largest, but because of the fluctuation of its peripheral data, the data center of gravity cannot always be kept as the maximum value [14], and the absolute difference between aðρÞ and a + 1ðρÞ therefore needs to be calculated to obtain…”
Section: Construction Of Malicious Intrusion Datamentioning
confidence: 99%
“…The datasets used for the experiment were CIC-IDS 2017 [31] and ISCX-IDS 2012 [32]. In most ML methods, transformation is applied before classification is performed [7,33,34]. In our proposed method, we initially start by performing basic data cleaning and then pre-processing on the raw dataset.…”
Section: Methodology and Methodsmentioning
confidence: 99%
“…Commonly used network security systems that discover suspicious attacks involve firewalls, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs) [1]. Among them, the task of IDSs is to collect and identify abnormal behaviors in the network [2]. By analyzing captured data packets, IDSs can check legitimate network behaviors, detect the attacks, and report the attacks for further containment.…”
Section: Introductionmentioning
confidence: 99%