2009
DOI: 10.1587/transcom.e92.b.1981
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 17 publications
0
18
0
Order By: Relevance
“…To this end, we first collected raw traffic data from our honeypots (Song et al, 2008c), and we extracted 14 statistical features (Benchmark Data, 2010;Song et al, 2009) from them as described in subsection 4.1. We also captured IDS alerts that were recorded by Snort (ver.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…To this end, we first collected raw traffic data from our honeypots (Song et al, 2008c), and we extracted 14 statistical features (Benchmark Data, 2010;Song et al, 2009) from them as described in subsection 4.1. We also captured IDS alerts that were recorded by Snort (ver.…”
Section: Resultsmentioning
confidence: 99%
“…The proposed algorithm improves the detection accuracy and reduce the false positive rate by overcoming shortcomings of the K-means in intrusion detection. Also, Song, et al proposed a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate (Song et al, 2009). …”
Section: Intrusion Detection Using Raw Traffic Datamentioning
confidence: 99%
See 2 more Smart Citations
“…Unsupervised Anomaly Detection System [21] is based on clustering and multiple one-class SVM to detect 0-day attacks and to improve the detection rate while maintaining a low false positive rate. It is able to construct intrusion detection models automatically without using labeled training data.…”
Section: Related Workmentioning
confidence: 99%