2021 IEEE International Performance, Computing, and Communications Conference (IPCCC) 2021
DOI: 10.1109/ipccc51483.2021.9679415
|View full text |Cite
|
Sign up to set email alerts
|

Learning to Detect: A Data-driven Approach for Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Standardization has been utilized to change numeric features, such that the mean of each feature will have a mean of 0 and a standard deviation of 1 [26,27]. This brings all features to a similar scale, making it easier for machine learning and deep algorithms to learn and converge faster.…”
Section: Standardizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Standardization has been utilized to change numeric features, such that the mean of each feature will have a mean of 0 and a standard deviation of 1 [26,27]. This brings all features to a similar scale, making it easier for machine learning and deep algorithms to learn and converge faster.…”
Section: Standardizationmentioning
confidence: 99%
“…The NSL-KDD dataset contains network connection records labeled as either normal or belonging to a specific type of attack. Class imbalance is present in NSL-KDD as the number of instances in one class (e.g., normal) is significantly larger than the number of instances in another class [27]. To handle class imbalance in the NSL-KDD dataset, several techniques can be employed.…”
Section: Imbalance Handlingmentioning
confidence: 99%
“…In another research on the cybersecurity dataset, NSL-KDD, Tauscher et al [25] utilized SVM-SMOTE for oversampling the minority instances in a four-class classification problem. They observe that oversampling, despite having a minor impact on the accuracy and the micro F1 score, helps the deep neural network based model in learning patterns and improving the F1 score of the U2R attack category.…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion Detection Systems (IDSs) are traditionally considered as a second line of defence, with the aim of monitoring the network tra c and detecting malicious activities that have eluded the security perimeter [19]. IDSs are generally divided into signature-based or anomalybased [29]. The first category, also known as misuse IDS, is based on pattern recognition, with the goal of comparing signatures of well-known attacks to current network tra c patterns.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, data-driven approaches for developing IDSs have been explored [15,26,29] considering di erent methods such as random forests, support vector machines, neural networks or clustering techniques. In particular, machine learning and deep learning are emerging as promising data-driven methods with the capability to learn and extract harmful patterns from network traffic, which can be beneficial for detecting security threats occurring in networked systems in general [26], and on IoT networks in particular [5,22].…”
Section: A Ml-based Intrusion Detection Systemsmentioning
confidence: 99%