2016
DOI: 10.1063/1.4958506
|View full text |Cite
|
Sign up to set email alerts
|

Performance comparison of intrusion detection system based anomaly detection using artificial neural network and support vector machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 12 publications
0
6
0
1
Order By: Relevance
“…The research was successful at creating the model but proved to be only a slight improvement over regular SVM, showing that the model even without enhancements or augmenting is capable of accurately classifying attack data. Other more recent research compared SVM and ANN’s ability to classify attack data [ 18 ]. As previously mentioned, SVM relies on placing a hyperplane to separate data which can be expressed as follows: where a is the vector of the same dimensions as the input feature vector x and b is the bias.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The research was successful at creating the model but proved to be only a slight improvement over regular SVM, showing that the model even without enhancements or augmenting is capable of accurately classifying attack data. Other more recent research compared SVM and ANN’s ability to classify attack data [ 18 ]. As previously mentioned, SVM relies on placing a hyperplane to separate data which can be expressed as follows: where a is the vector of the same dimensions as the input feature vector x and b is the bias.…”
Section: Background and Related Workmentioning
confidence: 99%
“…We now compare the performance of the proposed RFID‐based IDS model with the recent data mining‐based NIDS. Tables 7–11 and Figures 12–16 show the comparative performance of the proposed RFID‐based IDS model with random forest‐based IDS, SVM‐based IDS, and principal component analysis‐based IDS . From these tables and figures, it can be clearly observed that the PNN/GRRN gives high detection accuracy with low false alarm rate in comparison with other IDS models due to the prior knowledge discovery about the dependencies with high accuracy and efficiency.…”
Section: Resultsmentioning
confidence: 96%
“…Intrusion can be detected based on the two modules: Signature-Based and Anomaly Based (Bhuyan et al, 2014). The signature-based approach detects intrusion by examining the pattern and match it with the signature stored in the existing database of the system (Cahyo et al, 2016). Signature Based has great accuracy in detection.…”
Section: B Detection Type Of Wireless Sensor Network Intrusion Detection Systemmentioning
confidence: 99%
“…Anomaly-based is a detection approach of IDS that detects intrusion based on the created profile of the system (Cahyo et al, 2016). The profile is created to define the normal traffic pattern and the detection is done by matching the pattern of the traffic.…”
Section: B Detection Type Of Wireless Sensor Network Intrusion Detection Systemmentioning
confidence: 99%