2021
DOI: 10.1109/access.2020.3048198
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 123 publications
(41 citation statements)
references
References 38 publications
0
40
0
Order By: Relevance
“…Training classifiers on imbalanced datasets can affect their performance, both due to the imbalanced ratio of attack to benign traffic and the imbalance between several attack classes. Some methods have been proposed to augment or synthetically inflate minority samples for attack traffic [29]. As an anomaly-detection method, CBAM is, however, trained on a self-supervised way strictly on benign traffic, with no attack traffic being present in the training data.…”
Section: Sample Imbalance and Evaluation Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…Training classifiers on imbalanced datasets can affect their performance, both due to the imbalanced ratio of attack to benign traffic and the imbalance between several attack classes. Some methods have been proposed to augment or synthetically inflate minority samples for attack traffic [29]. As an anomaly-detection method, CBAM is, however, trained on a self-supervised way strictly on benign traffic, with no attack traffic being present in the training data.…”
Section: Sample Imbalance and Evaluation Methodologymentioning
confidence: 99%
“…Zhou et al [38] used embeddings to facilitate anomaly-detection that is robust against dataset imbalances. Liu et al [29] use embeddings to augment and inflate minority class data samples for the same purpose.…”
Section: Related Workmentioning
confidence: 99%
“…The results showed that random forest (RF) outperformed deep learning algorithms. Two imbalanced datasets of similar size to the above reference were used in [51] to test a resampling technique proposed in the work with different machine learning algorithms including RF and LSTM. The proposal was compared with popular resampling techniques such as random undersampling (RUS), random oversampling (ROS) or SMOTE.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, new device types and network structures have emerged, such as 5G, cloud computing, and the Internet of Things (IoT). With the growth of these systems and networks, ensuring their cyber security is critical [14]. According to the 2021 Cyber Threat Defense Report (CyberEdge, 2021) [4] released by the CyberEdge team and compiled from data provided by 1200 IT security experts working in 19 different sectors in 17 different countries, attacks to companies connected to the internet network have been increased (Figure -1).…”
Section: Introductionmentioning
confidence: 99%