A survey of distance and similarity measures used within network intrusion anomaly detection

DJ Weller-Fahy, BJ Borghetti… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Anomaly detection (AD) use within the network intrusion detection field of research, or
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …

Improving performance of intrusion detection system using ensemble methods and feature selection

NT Pham, E Foo, S Suriadi, H Jeffrey… - Proceedings of the …, 2018 - dl.acm.org
The main task of an intrusion detection system (IDS) is to detect anomalous behaviors from
both within and outside the network system, and there have been increasing studies …

Unsupervised clustering approach for network anomaly detection

I Syarif, A Prugel-Bennett, G Wills - … , NDT 2012, Dubai, UAE, April 24-26 …, 2012 - Springer
This paper describes the advantages of using the anomaly detection approach over the
misuse detection technique in detecting unknown network intrusions or attacks. It also …

Application of bagging, boosting and stacking to intrusion detection

I Syarif, E Zaluska, A Prugel-Bennett, G Wills - Machine Learning and Data …, 2012 - Springer
This paper investigates the possibility of using ensemble algorithms to improve the
performance of network intrusion detection systems. We use an ensemble of three different …

Intrusion detection based on ensemble learning for big data classification

F Jemili, R Meddeb, O Korbaa - Cluster Computing, 2024 - Springer
The escalating frequency and sophistication of cyber threats pose significant challenges to
traditional intrusion detection methods. Signature-based misuse detection, hybrid detection …

Intrusion detection model based on ensemble learning for U2R and R2L attacks

P Sornsuwit, S Jaiyen - 2015 7th international conference on …, 2015 - ieeexplore.ieee.org
Intrusion Detection System (IDS) is a tool for anomaly detection in network that can help to
protect network security. At present, intrusion detection systems have been developed to …

Building an ensemble learning based algorithm for improving intrusion detection system

MS Abirami, U Yash, S Singh - Artificial Intelligence and Evolutionary …, 2020 - Springer
Intrusion detection system (IDS) alerts the network administrators against intrusive attempts.
The anomalies are detected using machine learning techniques such as supervised and …

Exploring discrepancies in findings obtained with the KDD Cup'99 data set

V Engen, J Vincent, K Phalp - Intelligent Data Analysis, 2011 - content.iospress.com
The KDD Cup'99 data set has been widely used to evaluate intrusion detection prototypes,
most based on machine learning techniques, for nearly a decade. The data set served well …

A data mining based system for automating creation of cyber threat intelligence

SM Arıkan, S Acar - … on Digital Forensics and Security (ISDFS), 2021 - ieeexplore.ieee.org
In this study, since it is a laborious task to create cyber threat intelligence (CTI), a system that
will facilitate the generating of CTI with data mining techniques is proposed. With the system …

Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the KDD cup'99 data set and multi-objective evolution of …

V Engen - 2010 - eprints.bournemouth.ac.uk
For the last decade it has become commonplace to evaluate machine learning techniques
for network based intrusion detection on the KDD Cup'99 data set. This data set has served …