2019 2nd International Conference on New Trends in Computing Sciences (ICTCS) 2019
DOI: 10.1109/ictcs.2019.8923067
|View full text |Cite
|
Sign up to set email alerts
|

Optimized Multi - Layer Hierarchical Network Intrusion Detection System with Genetic Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Methodologies such as Genetic Algorithms (GA) [122], Particle Swarm Optimization (PSO) [123] and Ant Colony Optimization (ACO) [124]) are now used for feature selection and optimization for solving problems ranging from the detection of malware in Android OS to the improvement of intrusion detection systems. Unfortunately, to be efficiently deployed to production-quality scenarios, the bio-inspired methods require facing several problems, such as solving the imbalance of a dataset [125], tuning the configurations of neural network models [126], as well as finding the optimal combination of parameters while avoiding the problem of falling into local optimal solution [127]. However, GA algorithms demonstrated their capability for obtaining a strong generalization ability and robustness by finding the best learner group for ensemble models [128].…”
Section: E Bio-inspired and Other Detection Methodsmentioning
confidence: 99%
“…Methodologies such as Genetic Algorithms (GA) [122], Particle Swarm Optimization (PSO) [123] and Ant Colony Optimization (ACO) [124]) are now used for feature selection and optimization for solving problems ranging from the detection of malware in Android OS to the improvement of intrusion detection systems. Unfortunately, to be efficiently deployed to production-quality scenarios, the bio-inspired methods require facing several problems, such as solving the imbalance of a dataset [125], tuning the configurations of neural network models [126], as well as finding the optimal combination of parameters while avoiding the problem of falling into local optimal solution [127]. However, GA algorithms demonstrated their capability for obtaining a strong generalization ability and robustness by finding the best learner group for ensemble models [128].…”
Section: E Bio-inspired and Other Detection Methodsmentioning
confidence: 99%
“…Their results suggested that ELM has better performance when presented with large data, while SVM performed the best with relatively small data. Santikellur et al (2019) proposed and evaluated the use of a new multi-layer network-based IDS to improve the detection rate of modern network attacks. The proposed system implements a hierarchical architecture of multiple machine learning models optimised using evolutionary computing algorithms organised into a two-layer architecture.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposed system implements a hierarchical architecture of multiple machine learning models optimised using evolutionary computing algorithms organised into a two-layer architecture. The first layer consists of several variants of three binomial classifiers (i.e., AdaBoost, ANN and NB), while the second layer has a decision tree (DT) multi-class classifier [23]. The authors evaluated the system using the CIC-IDS-2017 dataset.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation