2018
DOI: 10.1007/978-981-13-1402-5_22
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Hybrid Data Mining Algorithms for Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Real-time network traffic classification has the capability to deal with the problem of sever network management for Internet Service Providers (ISPs) and their equipment vendors. It is essential for the SSC network operator to keep an eye on network [4], what is flowing on over their networks; thus they can manage and control the system in support of their goals. The end goal is to improve SSC network performance and identify intrusion or malicious of sustainable smart cities traffic.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Real-time network traffic classification has the capability to deal with the problem of sever network management for Internet Service Providers (ISPs) and their equipment vendors. It is essential for the SSC network operator to keep an eye on network [4], what is flowing on over their networks; thus they can manage and control the system in support of their goals. The end goal is to improve SSC network performance and identify intrusion or malicious of sustainable smart cities traffic.…”
Section: Introductionmentioning
confidence: 99%
“…The end goal is to improve SSC network performance and identify intrusion or malicious of sustainable smart cities traffic. In our previous study, we studied sustainable smart cities and find out effective ML technique for Smart Cities (SM) traffic classification using ML technique [5] based on bijective soft set [6] .Furthermore, traffic classification is also the central part of the automated intrusion detection systems used to detect denial service attacks [4] reallocation of network resources or identify customer resource in a network and then reallocation. In the last decade, IP traffic classification technique is proposed, traditionally the methods have been based on direct inspection of each packet's contents of flows at a specific point on the network.…”
Section: Introductionmentioning
confidence: 99%
“…Although anomaly detection is suitable for the detection of new or unknown attacks, its disadvantage is that it cannot detect attacks similar to normal and also generates too many false alarms. Because misuse detection produces signatures or rules, it generates far fewer false alarms, but its disadvantage is that it can detect only known attacks [4].…”
Section: Introductionmentioning
confidence: 99%