2020
DOI: 10.1016/j.procs.2020.07.080
|View full text |Cite
|
Sign up to set email alerts
|

Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 11 publications
2
8
0
Order By: Relevance
“…Table 12 exhibit the results of the comparison time taken in second, for the proposed methods (DEM3sel and DEMdif) with previous IDSs based on data mining such as (Serinelli et al [32]; and Pattewar and Sonawane [33]). These works were used NSL-KDD dataset.…”
Section: Resultsmentioning
confidence: 99%
“…Table 12 exhibit the results of the comparison time taken in second, for the proposed methods (DEM3sel and DEMdif) with previous IDSs based on data mining such as (Serinelli et al [32]; and Pattewar and Sonawane [33]). These works were used NSL-KDD dataset.…”
Section: Resultsmentioning
confidence: 99%
“…The proposed approach uses DBN to reduce PNN network training and testing time by translating raw data into low-dimensional data. Spinelli et al [16] suggested a behaviour-based Network Intrusion Detection System Near-to-real time (ANIDINR), a detailed methodology to predict zero-day attacks. However, the proposed scheme generates an incorrect response when the attacker produces an attack profile close to the normal.…”
Section: Literature Reviewmentioning
confidence: 99%
“…IDS is a type of security software that observes network traffic and gives warnings once an unusual behavior is discovered [8]. Generally, there are two kinds of IDS: host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS) [9]. HIDS, known as a passive component, focuses on a single machine [10].…”
Section: Introductionmentioning
confidence: 99%
“…HIDS, known as a passive component, focuses on a single machine [10]. On the other hand, NIDS, known as an active component, is used to analyze network packets as well as to monitor and safeguard a system from network risks [9]. The focus of this research was on NIDS, since the proposed IDS analyzes the flow of data among computers, such as network traffic, detects unusual behavior, and defends nodes from complex assaults.…”
Section: Introductionmentioning
confidence: 99%