2021
DOI: 10.1109/access.2021.3075066
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Misuse-Based Network Intrusion Detection: Overview, Unified Evaluation and Feature Choice Comparison Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 109 publications
0
15
0
Order By: Relevance
“…To investigate the effect of using flow bucket feature extraction, we consider a unidirectional bucket configuration with l = 96, m = 5 and where n is either 1, 10, 100 or 1000. This configuration produces features that are in line with the features in [14,35] and allows for assessing whether flow bucket features actually work for machine learning. As the results in Table 1 show, that is actually the case: For 10, 100 and 1000 buckets the results are only slightly lower than the baseline, without any indications that one is significantly worse than the other.…”
Section: Flow Bucketsmentioning
confidence: 99%
See 4 more Smart Citations
“…To investigate the effect of using flow bucket feature extraction, we consider a unidirectional bucket configuration with l = 96, m = 5 and where n is either 1, 10, 100 or 1000. This configuration produces features that are in line with the features in [14,35] and allows for assessing whether flow bucket features actually work for machine learning. As the results in Table 1 show, that is actually the case: For 10, 100 and 1000 buckets the results are only slightly lower than the baseline, without any indications that one is significantly worse than the other.…”
Section: Flow Bucketsmentioning
confidence: 99%
“…Feature extraction modules serve to extract features to some extent, but do not support all features that are available in publicly available datasets. Finally, reporting the detection performance often remains limited to reporting an accuracy value, while previous work indicates this is not a good representation due to prevalent class imbalance [14]. This paper investigates both the application of deep learning for network intrusion detection, as well as the real-time extraction of generic features that are dataset independent.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations