2014
DOI: 10.1504/ijipt.2014.066377
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection method based on nonlinear correlation measure

Abstract: Abstract-Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services, are more widespread and closely related to our daily life. Thus, it has raised a serious concern in individual internet users, industry and research community. A significant amount of work has been conducted to develop intelligent anomaly-based Intrusion Detection Systems (IDSs) to address this issue. However, one technical chal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…There are also approaches to anomaly detection outside of classification, such as clustering [ 11 ] and correlation analysis [ 12 ]. Clustering uses distance metrics to determine if a new point’s distance from a cluster centroid exceeds an acceptable value: if this is the case, it is considered anomalous.…”
Section: Introductionmentioning
confidence: 99%
“…There are also approaches to anomaly detection outside of classification, such as clustering [ 11 ] and correlation analysis [ 12 ]. Clustering uses distance metrics to determine if a new point’s distance from a cluster centroid exceeds an acceptable value: if this is the case, it is considered anomalous.…”
Section: Introductionmentioning
confidence: 99%
“…where u q is the feasible point of problem ( 6) obtained in q th inner iteration. e projected Barzilai-Borwein (PBB) method [21] is applied to solve problem (6), which is introduced in Section 4.3.3. In practice, problem ( 6) is an ill-conditioned problem.…”
Section: E Subproblem Of (W B)mentioning
confidence: 99%
“…It aims to distinguish attack data from normal behaviors. Besides the traditional rule-based detection techniques [1,2], considerable methods based on statistical theory [3,4], information theory [5,6], and machine learning [7,8] are widely used in abnormal traffic detection problem.…”
Section: Introductionmentioning
confidence: 99%
“…To compute such correlation, Pearson's correlation coefficient is commonly used, although this coefficient is only able to express linear relations. Other correlation-based filter methods use Mutual Information (MI) (based on entropy), which is able to measure complex relations [128], but can be applied to discrete features only. CFS methods based on Mutual Information have been used for NIDS in [85,86,102].…”
Section: Feature Subset Selectionmentioning
confidence: 99%