2013
DOI: 10.1093/comjnl/bxt044
|View full text |Cite
|
Sign up to set email alerts
|

MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method

Abstract: With the growth of networked computers and associated applications, intrusion detection has become essential to keeping networks secure. A number of intrusion detection methods have been developed for protecting computers and networks using conventional statistical methods as well as data mining methods. Data mining methods for misuse and anomaly-based intrusion detection, usually encompass supervised, unsupervised and outlier methods. It is necessary that the capabilities of intrusion detection methods be upd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(40 citation statements)
references
References 46 publications
(38 reference statements)
0
40
0
Order By: Relevance
“…The multiple One-class SVM models are trained by disjoint normal training data subsets, which are decomposed by the misuse detection component. Furthermore, in the multi-level hybrid intrusion detection method of [17], three levels of detection respectively built by a supervised, an unsupervised and an outlier-based method are presented. In general, this type of hybrid approach is designed for a high detection rate.…”
Section: Related Studiesmentioning
confidence: 99%
“…The multiple One-class SVM models are trained by disjoint normal training data subsets, which are decomposed by the misuse detection component. Furthermore, in the multi-level hybrid intrusion detection method of [17], three levels of detection respectively built by a supervised, an unsupervised and an outlier-based method are presented. In general, this type of hybrid approach is designed for a high detection rate.…”
Section: Related Studiesmentioning
confidence: 99%
“…Thereafter, all related information was extracted using tshark (2013), which is a terminal-based version of wireshark that was used to extract 11 features from the TCP packets (Table 2). The features were chosen from numerous network features in the packet-level features of the TUIDS intrusion dataset (Gogoi 2013). Above all, the main challenge in feature selection was finding the most relevant features that led to the highest true positive rate.…”
Section: Feature Selection and Extraction Phasementioning
confidence: 99%
“…Multiple intrusion detection approaches can be simultaneously deployed based on the security demands . The purpose of combining two or more techniques is to design new intrusion processes by taking advantages of different techniques.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%