2019 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE) 2019
DOI: 10.1109/wiecon-ece48653.2019.9019921
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System using Naive Bayes algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 8 publications
0
9
0
1
Order By: Relevance
“…The Naïve Bayes method is another instance of supervised machine learning that is based on the Bayes theorem, which asserts that classes of values for all attributes are independent of one another. 19 The Gaussian Naïve Bayes are more fitting for categorical data sets with more than two kinds of attacks. The NB algorithm provides an advantage when dealing with novel attack types, and it also trains more quickly.…”
Section: Naïve Bayesmentioning
confidence: 99%
See 1 more Smart Citation
“…The Naïve Bayes method is another instance of supervised machine learning that is based on the Bayes theorem, which asserts that classes of values for all attributes are independent of one another. 19 The Gaussian Naïve Bayes are more fitting for categorical data sets with more than two kinds of attacks. The NB algorithm provides an advantage when dealing with novel attack types, and it also trains more quickly.…”
Section: Naïve Bayesmentioning
confidence: 99%
“…The NB algorithm provides an advantage when dealing with novel attack types, and it also trains more quickly. 19…”
Section: Naïve Bayesmentioning
confidence: 99%
“…Gambar 2. Konsep Kerja SIDS [1] (Sumber: Khraisat et al, 2019) Peneliti sebelumnya terkait alert IDS dengan klasifikasi Naïve Bayes antara lain dilakukan dengan: KDD99 dataset dan teknik PCA [7], AIDS dan teknik Correlation-Based Feature Selection [8], NSL-KDD dataset [9], zero probability [10], NSL-KDD dataset dan teknik PCA ditambah SVM [11], KNN sebagai perbandingan [12], diskritisasi variabel [13], Gaussian Naïve Bayes dan Kyoto dataset [14], HND dan KDD99 dataset [15], MNBIDS dan KDD99 dataset [16].…”
Section: Pendahuluanunclassified
“…Host-based (HIDS) are software items mounted on the host machine to analyze and track all traffic events in device application files and operating systems [51]. Network-Based IDS are located at strategic points on the network to catch and analyze the stream of packets passing through network links, in contrast to the HIDS, which analyzes each host individually [52] [53]. The difference between HIDS and NIDS is shown in Table 1.…”
Section: Host-based Ids (Hids) Vs Network-based Ids (Nids)mentioning
confidence: 99%