2016 Asia Pacific Conference on Multimedia and Broadcasting (APMediaCast) 2016
DOI: 10.1109/apmediacast.2016.7878168
|View full text |Cite
|
Sign up to set email alerts
|

Review of semi-supervised method for Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 23 publications
0
5
0
1
Order By: Relevance
“…Numerous strategies related to detection and mitigation of the DDoS attack in SDN was surveyed [19−21]. Most of the models incorporate either supervised machine learning such as clustering, unsupervised machine learning such as classification or semi-supervised machine learning which is the combination of both supervised and unsupervised machine learning algorithms [22]. Entropy, a statistical approach, is considered to be the most common significant approach that measures the randomness which is then used to analyze the traffic flow.…”
Section: Related Workmentioning
confidence: 99%
“…Numerous strategies related to detection and mitigation of the DDoS attack in SDN was surveyed [19−21]. Most of the models incorporate either supervised machine learning such as clustering, unsupervised machine learning such as classification or semi-supervised machine learning which is the combination of both supervised and unsupervised machine learning algorithms [22]. Entropy, a statistical approach, is considered to be the most common significant approach that measures the randomness which is then used to analyze the traffic flow.…”
Section: Related Workmentioning
confidence: 99%
“…We note that in theory, anomaly-based attack detection methods (as in AIDSs) necessitate only benign instances for training [9], as they are intended to capture only the normal traffic patterns of M , and then label any severe-enough abnormality as an attack. However, in practice, AIDSs tend to suffer from non-negligible FPR [9], [107], [108], [109], [110], [111], meaning that in too many cases, rare-yet-benign abnormal events are falsely identified as attacks. Consequently, redundant and potentially harsh countermeasures might be activated in response.…”
Section: Comparison Of Approaches For Iot Attack Detectability Assess...mentioning
confidence: 99%
“…Consequently, redundant and potentially harsh countermeasures might be activated in response. To decrease the FPR which is associated with such (unsupervised) anomaly-based methods, one could use labeled data for model calibration or anomaly threshold tuning, as in semisupervised [109], [110] or hybrid [111] approaches.…”
Section: Comparison Of Approaches For Iot Attack Detectability Assess...mentioning
confidence: 99%
“…With the ability to learn knowledge from the data without specifically programming the system to do so, machine learning algorithms provide a human‐independent solution for the intrusion detection problem . There are three types of machine learning, namely supervised, semi‐supervised , and unsupervised . The advantage of unsupervised learning is that it does not require labeled data.…”
Section: Introductionmentioning
confidence: 99%