2017
DOI: 10.1016/j.eswa.2016.09.041
|View full text |Cite
|
Sign up to set email alerts
|

Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
170
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 381 publications
(181 citation statements)
references
References 19 publications
1
170
0
Order By: Relevance
“…Thereafter, the top-ranked flows are considered as anomalies on the basis of a thresholding approach. The approach proposed by Casas et al [29] displayed a better performance in comparison with other unsupervised anomaly detection methods such as DBSCAN, k-means, and PCA. However, since it extracts some TCP flags such as SYN, it may not be appropriate for the SDN case due to the fact that dealing with flows is more fast and efficient than handling each packet separately.…”
Section: Related Workmentioning
confidence: 96%
See 1 more Smart Citation
“…Thereafter, the top-ranked flows are considered as anomalies on the basis of a thresholding approach. The approach proposed by Casas et al [29] displayed a better performance in comparison with other unsupervised anomaly detection methods such as DBSCAN, k-means, and PCA. However, since it extracts some TCP flags such as SYN, it may not be appropriate for the SDN case due to the fact that dealing with flows is more fast and efficient than handling each packet separately.…”
Section: Related Workmentioning
confidence: 96%
“…Al-Yaseen el al. [29] proposed a multi-level hybrid system on the basis of SVM and ELM. Based on experimental results conducted on the KDD Cup 99 dataset, the system showed high accuracy (95.75%) and low false alarm rate (1.87%).…”
Section: Related Workmentioning
confidence: 99%
“…In this paper [7], an author presented a technique based on the Online Sequential Extreme Learning Machine (OS-ELM). In this paper [8], an author presented a multilevel hybrid intrusion detection model using a combination of K-means, SVM, as well as ELM algorithms. In this paper [9], an author used a multi-objective particle swarm optimization algorithm for feature selection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…KNN algorithm [17] is widely used in pattern recognition, classification, and regression. Same as KNN, vector automatic classification algorithms, support vector machine [18][19][20], neural network algorithm [21], Bayesian algorithm [22][23][24], and means algorithm are also widely used for IDS [25,26].…”
Section: Introductionmentioning
confidence: 99%