2010
DOI: 10.1016/j.eswa.2010.04.017
|View full text |Cite
|
Sign up to set email alerts
|

Random effects logistic regression model for anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(13 citation statements)
references
References 20 publications
(21 reference statements)
0
12
0
Order By: Relevance
“…We used a Metasploitable3 [45] [11]. In particular, we consider these seven methods: Support Vector Machines (SVM) [66], k-Nearest Neighbour (kNN) [67], Naïve Bayes (NB) [68], decision tree-based methods (i.e., Random Forest (RF) & Classification and Regression Trees (CART) [66]), as well as Logistics Regression (LR) [69], and Linear Discriminant Analysis (LDA) [70]. The authors in [67] [11] also showed that SVM, kNN, NB and CART are the most popular methods used for IDS development.…”
Section: B Normal and Attack Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…We used a Metasploitable3 [45] [11]. In particular, we consider these seven methods: Support Vector Machines (SVM) [66], k-Nearest Neighbour (kNN) [67], Naïve Bayes (NB) [68], decision tree-based methods (i.e., Random Forest (RF) & Classification and Regression Trees (CART) [66]), as well as Logistics Regression (LR) [69], and Linear Discriminant Analysis (LDA) [70]. The authors in [67] [11] also showed that SVM, kNN, NB and CART are the most popular methods used for IDS development.…”
Section: B Normal and Attack Scenariosmentioning
confidence: 99%
“…• Logistic Regression (LR) [69]: even though it has the name 'regression', LR is commonly used for classification problems such as intrusion detection and spam filtering, as it can estimate the probability that an observation belongs to a particular class [72]. For instance, if the estimated probability is greater than 50%, then the model will predict that the observation belongs to attack class since it exceeds the threshold; otherwise, it will predict it as a normal class.…”
Section: B Normal and Attack Scenariosmentioning
confidence: 99%
“…Over the past few years, a number of models and approaches based on traditional machine learning have been proposed for network intrusion detection. Examples include the Support Vector Machine (SVM) [24], [25], K-Nearest Neighbors (KNN) [26], Artificial Neural Networks (ANN) [17], [18], Random Forests (RF) [24], [25], [59], Decision Trees (DT) [23], [26], [27], [60], [61], Linear Regression (LR), Naïve Bayes (NB), Expectation Maximization (EM) [23], Simulated Annealing (SA) [27], Simplified Swarm Optimization (SSO) [28], Neutrosophic Logic (NL) [29], Neurotree [30], Random Effects Logistic Regression (RELR) [31], PCA filtering [62], and others reported in [32]- [34]. Recently, Nawir et al [35] proposed a classification model based on the Average One Dependence Estimator (AODE) algorithm for multiclass classification, on the UNSW-NB15 dataset, reporting an accuracy of 83.47% and a false alarm rate (FAR) of 6.57%.…”
Section: Related Workmentioning
confidence: 99%
“…The Bayesian methods based on MCMC simulation provides a more effective approach for model estimation when compared to traditional maximum likelihood estimation (Burda, Harding, & Hausman, 2008;Mok, Sohn, & Ju, 2010). The multinomial logit model with repeated measures was performed in R (Version 2.15.2) with a Bayesian MCMC using the MCMCglmm package, with significance assessed at α < .05.…”
Section: Statistical Modelsmentioning
confidence: 99%