2009
DOI: 10.1016/j.eswa.2009.05.029
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection by machine learning: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
377
0
18

Year Published

2012
2012
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 794 publications
(395 citation statements)
references
References 43 publications
0
377
0
18
Order By: Relevance
“…[22] considers the possibility of application of MAR splines in ASDCA, enabling building of exact approximation of the behavior of a standard user, or of the attacking side, according to specified parameters. A large number of works is devoted to statistical analysis of the data in ASDCA [15,23], to signature models [24] and theoretical aspects of the use of Markov chains [5,6,24] and the Petri nets [25] for the systems of cyber-attacks recognition.…”
Section: Introductionmentioning
confidence: 99%
“…[22] considers the possibility of application of MAR splines in ASDCA, enabling building of exact approximation of the behavior of a standard user, or of the attacking side, according to specified parameters. A large number of works is devoted to statistical analysis of the data in ASDCA [15,23], to signature models [24] and theoretical aspects of the use of Markov chains [5,6,24] and the Petri nets [25] for the systems of cyber-attacks recognition.…”
Section: Introductionmentioning
confidence: 99%
“…These datasets were used in many of IDS works such as in Liu et al (2007), Shafi and Abbas (2009) and Li et al, (2009). Tsai et al (2009) reported there have been 30 major IDS studies used KDDCup 1999 datasets in their research. According to Wu and Banzhaf (2010), KDDCup 1999 dataset is the largest publicly available and sophisticated benchmarks for researchers to evaluate intrusion detection algorithms or machine learning algorithms.…”
Section: Methodsmentioning
confidence: 99%
“…For feature scaling, we normalized the wide range of 3 Flow Number of flows f 4 SrcAddr Number of source addresses f 5 DstAddr Number of destination addresses f 6 SrcPort Number of source ports f 7 DstPort Number of destination ports f 8 ΔAddr |SrcAddr − DstAddr| f 9 ΔPort |SrcPort − DstPort| different features into a standard range of 0 to 1. We scaled features according tô…”
Section: Feature Extraction and Feature Scalingmentioning
confidence: 99%
“…Additionally, a recent study by Tsai et al [4] suggests that machine learning techniques can play a major role in anomaly detection in computer networks. Several learning algorithms, such as k-nearest neighbor algorithms [5], neural networks [6], and support vector machines [6], [7], Manuscript received November 11, 2013.…”
Section: Introductionmentioning
confidence: 99%