2021
DOI: 10.1109/mis.2021.3057914
|View full text |Cite
|
Sign up to set email alerts
|

Isolation Forest Based Anomaly Detection Framework on Non-IID Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Finally, we consider the problem of intrusion detection from both an accept/reject and open set recognition perspective using the NSL-KDD dataset [47]. This data represents a distinctly different one from either the OLETTER or multi-feature Fourier character based datasets given all of the features are either categorical, discrete or integer in nature, and we leverage (12) in the process of anomaly generation. For this data set, in addition to 'Normal' network traffic, we chose to include Probe, Denial of Service (DoS) and Remote-to-Local types of attacks with attack types tabulated in Table 4 in the training set.…”
Section: Categorical Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, we consider the problem of intrusion detection from both an accept/reject and open set recognition perspective using the NSL-KDD dataset [47]. This data represents a distinctly different one from either the OLETTER or multi-feature Fourier character based datasets given all of the features are either categorical, discrete or integer in nature, and we leverage (12) in the process of anomaly generation. For this data set, in addition to 'Normal' network traffic, we chose to include Probe, Denial of Service (DoS) and Remote-to-Local types of attacks with attack types tabulated in Table 4 in the training set.…”
Section: Categorical Datamentioning
confidence: 99%
“…Isolation forest is a tree ensemble based method that measures anomalies by the depth of decision before reaching a leaf node. The more shallow and the fewer the cuts needed to reach a leaf node, the more likely it is that the sample is an anomaly [12]. Although OC-SVMs, AEs and Isolation Forests use different distance measures to identify anomalies, they represent some of the most mature and commonly employed discriminative approaches to novelty detection [13].…”
Section: Introductionmentioning
confidence: 99%
“…In "Isolation forest based anomaly detection framework on non-IID data," 10 Xiang et al study the problem of extending a widely used outlier detector, called isolation forest (iForest), to handle data drawn from a nonmetric space. The authors combine the underlying mechanism of isolation forest and extend distance-based hashing techniques to tackle this problem.…”
mentioning
confidence: 99%