2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI) 2017
DOI: 10.1109/kbei.2017.8324903
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system using an optimized framework based on datamining techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…This method is based on the classification strategies for the K-means and decision tree (DT) clustering algorithm. 24 Selvakumar B and Muneeswaran K in 2019 proposed that the reduction of dimensions shows a dynamic part in IDS, as timeconsuming process is to detect anomalies from network traffic in high-dimensionality function. Feature selection affects analytical speed and proposed research and deploys firefly algorithm-dependent filter and wrapper system in the wrapper to pick the apps.…”
Section: Related Workmentioning
confidence: 99%
“…This method is based on the classification strategies for the K-means and decision tree (DT) clustering algorithm. 24 Selvakumar B and Muneeswaran K in 2019 proposed that the reduction of dimensions shows a dynamic part in IDS, as timeconsuming process is to detect anomalies from network traffic in high-dimensionality function. Feature selection affects analytical speed and proposed research and deploys firefly algorithm-dependent filter and wrapper system in the wrapper to pick the apps.…”
Section: Related Workmentioning
confidence: 99%
“…With hybrid IDS , first, known attacks are detected and separated by matching with the attack signatures and then among the remaining stream the unknown attacks are detected by observing deviations of such packet features from those of the normal packets. [9], DT [25], Naïve Bayes [12], SVM [21], RF [30], NN [26], etc. are mostly used by many researchers for the construction of IDS.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Ariafar et. al in [25] proposed an optimized framework for network attack detection using Kmeans and DT methods. GA is used for optimizing the parameters (value of K and number of runs) of K-means and confidence parameter of DT.…”
Section: Existing Approaches To Idsmentioning
confidence: 99%
“…One such study was conducted by Ramaki et al, [14] where the authors reviewed hundreds of recently proposed solutions. Statistical methods are being used to detect events and discover previously unknown patterns using data mining approaches [15,16]. Many issues of the centralized approach like scalability and single point of failure can be solved by hierarchical structures.…”
Section: Introductionmentioning
confidence: 99%