2020
DOI: 10.17781/p002646
|View full text |Cite
|
Sign up to set email alerts
|

Integrated Intrusion Detection Scheme using Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…It is able to detect new types of attacks. Rai et al (2016) develop decision tree algorithm using the C4.5 tree approach and the algorithm is designed to address two major issues, feature selection and split value. Salient features are determined using information gain and each attribute is selected to make the classifier unbiased to most recurring values.…”
Section: Related Workmentioning
confidence: 99%
“…It is able to detect new types of attacks. Rai et al (2016) develop decision tree algorithm using the C4.5 tree approach and the algorithm is designed to address two major issues, feature selection and split value. Salient features are determined using information gain and each attribute is selected to make the classifier unbiased to most recurring values.…”
Section: Related Workmentioning
confidence: 99%
“…They showed that the main goal of an intrusion detection system is to find as many attacks as possible with as few false alarms as possible. (i) Estimating critical network parameter thresholds (ii) PCA, chi-square distribution, and Gaussian mixture distribution (iii) Least square support vector machine (LS-SVM) (iv) Genetic algorithm (GA) (v) Hybrid classifier (DTNB), which is a combination of decision table (DT) and NB algorithms (i) [26] (ii) [27] (iii) [28] (iv) [29] (v) [30] AI and machine learning methods AI and ML methods have a high predictive capacity and need little human intervention (i) Naïve Bayesian classifier and a decision tree (ii) Naïve Bayesian classifier (iii) SVM (iv) Hybrid model that incorporates data mining approaches such as the K-means clustering algorithm and the RBF kernel function of the support vector machine (v) Decision tree (J48) algorithm (vi) RF (vii) C4.5 decision tree (viii) k-means and k-nearest neighbors (ix) GA and best feature set selection (BFSS) (x) RF and SVM (i) [31] (ii) [32] (iii) [33] (iv) [34] (v) [35] (vi) [36] (vii) [37] (viii) [38] (ix) [39] (x) [40] Swarm intelligence and evolutionary computation methods It uses GAs, particle swarm optimization (PSO), and differential evolution computational techniques (i) GAs, PSO, and differential evolution (DE) (ii) Particle swarm optimization classifiers with genetic-particle swarm optimization (iii) Feature selection (EFS) algorithm and teaching learning-based optimization (TLBO) methodologies are combined (iv) Combines the approaches of PSO, GA, and neural networks (RBF) (i) [41] (ii) [42] (iii) [43] (iv) [44] Deep learning methods Part of AI where the model is a mathematical algorithm that is trained to provide the same conclusion or prediction as a human expert (i) [45] (ii) [46] (iii) [47] (iv) [48] (v) [49] (vi) [50] (vii) [51] (viii) [52] (ix) [53] (x) [54] (xi) [55] (xii) ...…”
Section: Intrusion Detection Techniques In Social Mediamentioning
confidence: 99%
“…In terms of using a naïve Bayesian classifier and a decision tree, Rai et al [32] proposed a new approach for adapting network intrusion detection. Mainly, the study addresses various data mining challenges, such as dealing with continuous attributes, handling missing values in the dataset, and reducing the noise in the training set.…”
Section: Ai and Machinementioning
confidence: 99%
“…ML algorithms can be roughly categorized into traditional ML and deep learning (DL) algorithms. Regarding traditional ML algorithms, decision tree-based anomaly detection is widely used in various fields, e.g., in smart grid [7] and computer network traffic [8]. Tian et.al adopted the Gradient Boosting Decision Tree (GBDT) algorithm for CAN bus intrusion detection and their method delivered a high True Positive (TP) rate and a low False Positive (FP) rate [9].…”
Section: Introductionmentioning
confidence: 99%