Siga este enlace para ver otros tipos de publicaciones sobre el tema: Unsupervised intrusion detection.

Artículos de revistas sobre el tema "Unsupervised intrusion detection"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Unsupervised intrusion detection".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

ZHONG, SHI, TAGHI M. KHOSHGOFTAAR y NAEEM SELIYA. "CLUSTERING-BASED NETWORK INTRUSION DETECTION". International Journal of Reliability, Quality and Safety Engineering 14, n.º 02 (abril de 2007): 169–87. http://dx.doi.org/10.1142/s0218539307002568.

Texto completo
Resumen
Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection — a challenging task in network security. Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Classification-based data mining models for intrusion detection are often ineffective in dealing with dynamic changes in intrusion patterns and characteristics. Consequently, unsupervised learning methods have been given a closer look for network intrusion detection. We investigate multiple centroid-based unsupervised clustering algorithms for intrusion detection, and propose a simple yet effective self-labeling heuristic for detecting attack and normal clusters of network traffic audit data. The clustering algorithms investigated include, k-means, Mixture-Of-Spherical Gaussians, Self-Organizing Map, and Neural-Gas. The network traffic datasets provided by the DARPA 1998 offline intrusion detection project are used in our empirical investigation, which demonstrates the feasibility and promise of unsupervised learning methods for network intrusion detection. In addition, a comparative analysis shows the advantage of clustering-based methods over supervised classification techniques in identifying new or unseen attack types.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Hajamydeen, Asif Iqbal y Nur Izura Udzir. "A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework". Scalable Computing: Practice and Experience 20, n.º 1 (9 de marzo de 2019): 113–60. http://dx.doi.org/10.12694/scpe.v20i1.1465.

Texto completo
Resumen
Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. Consequently, this investigation proposes a structure to identify an extensive variety of abnormalities by analysing heterogeneous logs, without utilizing either a prepared model of system transactions or the attributes of anomalies. To accomplish this, a current segment (clustering) has been used and a few new parts (filtering, aggregating and feature analysis) have been presented. Several logs from multiple sources are used as input and this data are processed by all the modules of the framework. As each segment is instrumented for a particular undertaking towards a definitive objective, the commitment of each segment towards abnormality recognition is estimated with various execution measurements. Ultimately, the framework is able to detect a broad range of intrusions exist in the logs without using either the attack knowledge or the traffic behavioural models. The result achieved shows the direction or pathway to design anomaly detectors that can utilize raw traffic logs collected from heterogeneous sources on the network monitored and correlate the events across the logs to detect intrusions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Zoppi, Tommaso, Mohamad Gharib, Muhammad Atif y Andrea Bondavalli. "Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems". ACM Transactions on Cyber-Physical Systems 5, n.º 4 (31 de octubre de 2021): 1–27. http://dx.doi.org/10.1145/3467470.

Texto completo
Resumen
Artificial Intelligence (AI)- based classifiers rely on Machine Learning (ML) algorithms to provide functionalities that system architects are often willing to integrate into critical Cyber-Physical Systems (CPSs) . However, such algorithms may misclassify observations, with potential detrimental effects on the system itself or on the health of people and of the environment. In addition, CPSs may be subject to threats that were not previously known, motivating the need for building Intrusion Detectors (IDs) that can effectively deal with zero-day attacks. Different studies were directed to compare misclassifications of various algorithms to identify the most suitable one for a given system. Unfortunately, even the most suitable algorithm may still show an unsatisfactory number of misclassifications when system requirements are strict. A possible solution may rely on the adoption of meta-learners, which build ensembles of base-learners to reduce misclassifications and that are widely used for supervised learning. Meta-learners have the potential to reduce misclassifications with respect to non-meta learners: however, misleading base-learners may let the meta-learner leaning towards misclassifications and therefore their behavior needs to be carefully assessed through empirical evaluation. To such extent, in this paper we investigate, expand, empirically evaluate, and discuss meta-learning approaches that rely on ensembles of unsupervised algorithms to detect (zero-day) intrusions in CPSs. Our experimental comparison is conducted by means of public datasets belonging to network intrusion detection and biometric authentication systems, which are common IDSs for CPSs. Overall, we selected 21 datasets, 15 unsupervised algorithms and 9 different meta-learning approaches. Results allow discussing the applicability and suitability of meta-learning for unsupervised anomaly detection, comparing metric scores achieved by base algorithms and meta-learners. Analyses and discussion end up showing how the adoption of meta-learners significantly reduces misclassifications when detecting (zero-day) intrusions in CPSs.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Meira, Jorge. "Comparative Results with Unsupervised Techniques in Cyber Attack Novelty Detection". Proceedings 2, n.º 18 (17 de septiembre de 2018): 1191. http://dx.doi.org/10.3390/proceedings2181191.

Texto completo
Resumen
Intrusion detection is a major necessity in current times. Computer systems are constantly being victims of malicious attacks. These attacks keep on exploring new technics that are undetected by current Intrusion Detection Systems (IDS), because most IDS focus on detecting signatures of previously known attacks. This work explores some unsupervised learning algorithms that have the potential of identifying previously unknown attacks, by performing outlier detection. The algorithms explored are one class based: the Autoencoder Neural Network, K-Means, Nearest Neighbor and Isolation Forest. There algorithms were used to analyze two publicly available datasets, the NSL-KDD and ISCX, and compare the results obtained from each algorithm to perceive their performance in novelty detection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Casas, Pedro, Johan Mazel y Philippe Owezarski. "Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge". Computer Communications 35, n.º 7 (abril de 2012): 772–83. http://dx.doi.org/10.1016/j.comcom.2012.01.016.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Zhao, Yi Lin y Qing Lei Zhou. "Intrusion Detection Method Based on LEGClust Algorithm". Applied Mechanics and Materials 263-266 (diciembre de 2012): 3025–33. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3025.

Texto completo
Resumen
Clustering analysis is a typical unsupervised learning technology in data mining, which can improve the efficiency of intrusion detection system. LEGClust cluster algorithm is a new clustering analysis technique and it can effectively find the arbitrary shape clusters hidden in the data. We apply this algorithm to the intrusion detection field and present an intrusion detection method. We introduce the real dissimilarity among data into the determination of data connection relationship. Experiment results on KDD CUP1999 Dataset show that LEGClust algorithm is an effective technique for intrusion detection and the improved LEGClust performs even better.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Almalawi, Abdulmohsen, Adil Fahad, Zahir Tari, Asif Irshad Khan, Nouf Alzahrani, Sheikh Tahir Bakhsh, Madini O. Alassafi, Abdulrahman Alshdadi y Sana Qaiyum. "Add-On Anomaly Threshold Technique for Improving Unsupervised Intrusion Detection on SCADA Data". Electronics 9, n.º 6 (18 de junio de 2020): 1017. http://dx.doi.org/10.3390/electronics9061017.

Texto completo
Resumen
Supervisory control and data acquisition (SCADA) systems monitor and supervise our daily infrastructure systems and industrial processes. Hence, the security of the information systems of critical infrastructures cannot be overstated. The effectiveness of unsupervised anomaly detection approaches is sensitive to parameter choices, especially when the boundaries between normal and abnormal behaviours are not clearly distinguishable. Therefore, the current approach in detecting anomaly for SCADA is based on the assumptions by which anomalies are defined; these assumptions are controlled by a parameter choice. This paper proposes an add-on anomaly threshold technique to identify the observations whose anomaly scores are extreme and significantly deviate from others, and then such observations are assumed to be ”abnormal”. The observations whose anomaly scores are significantly distant from ”abnormal” ones will be assumed as ”normal”. Then, the ensemble-based supervised learning is proposed to find a global and efficient anomaly threshold using the information of both ”normal”/”abnormal” behaviours. The proposed technique can be used for any unsupervised anomaly detection approach to mitigate the sensitivity of such parameters and improve the performance of the SCADA unsupervised anomaly detection approaches. Experimental results confirm that the proposed technique achieved a significant improvement compared to the state-of-the-art of two unsupervised anomaly detection algorithms.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Li, Longlong, Qin Chen, Shuiming Chi y Xiaohang Liu. "Unsupervised Intrusion Detection based on FCM and Vote Mechanism". Information Technology Journal 13, n.º 1 (15 de diciembre de 2013): 133–39. http://dx.doi.org/10.3923/itj.2014.133.139.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Iraqi, Omar y Hanan El Bakkali. "Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention". Security and Communication Networks 2019 (28 de julio de 2019): 1–13. http://dx.doi.org/10.1155/2019/8368473.

Texto completo
Resumen
As cyber threats are permanently jeopardizing individuals privacy and organizations’ security, there have been several efforts to empower software applications with built-in immunity. In this paper, we present our approach to immune applications through application-level, unsupervised, outlier-based intrusion detection and prevention. Our framework allows tracking application domain objects all along the processing lifecycle. It also leverages the application business context and learns from production data, without creating any training burden on the application owner. Moreover, as our framework uses runtime application instrumentation, it incurs no additional cost on the application provider. We build a fine-grained and rich-feature application behavioral model that gets down to the method level and its invocation context. We define features to be independent from the variable structure of method invocation parameters and returned values, while preserving security-relevant information. We implemented our framework in a Java environment and evaluated it on a widely-used, enterprise-grade, and open-source ERP. We tested several unsupervised outlier detection algorithms and distance functions. Our framework achieved the best results in terms of effectiveness using the Local Outlier Factor algorithm and the Clark distance, while the average instrumentation overhead per intercepted call remains acceptable.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Min, Luo, Zhang Huan-guo y Wang Li-na. "Research and implementation of unsupervised clustering-based intrusion detection". Wuhan University Journal of Natural Sciences 8, n.º 3 (septiembre de 2003): 803–7. http://dx.doi.org/10.1007/bf02900819.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Silaban, Andreas Jonathan, Satria Mandala y Erwid Jadied Mustofa. "Wrapper-Based Feature Selection Analysis For Semi-Supervised Anomaly Based Intrusion Detection System". International Journal on Information and Communication Technology (IJoICT) 5, n.º 2 (10 de junio de 2020): 32. http://dx.doi.org/10.21108/ijoict.2019.52.209.

Texto completo
Resumen
<p>Intrusion Detection System (IDS) plays as a role in detecting various types of attacks on computer networks. IDS identifies attacks based on a classification data network. The result of accuracy was weak in past research. To solve this problem, this research proposes using a wrapper feature selection method to improve accuracy detection. Wrapper-Feature selection works in the preprocessing stage to eliminate features. Then it will be clustering using a semi-supervised method. The semi-supervised method divided into two steps. There are supervised random forest and unsupervised using Kmeans. The results of each supervised and unsupervised will be ensembling using linear and logistic regression. The combination of wrapper and semi-supervised will get the maximum result.</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Cai, Long-zheng, Jian Chen, Yun Ke, Tao Chen y Zhi-gang Li. "A new data normalization method for unsupervised anomaly intrusion detection". Journal of Zhejiang University SCIENCE C 11, n.º 10 (29 de septiembre de 2010): 778–84. http://dx.doi.org/10.1631/jzus.c0910625.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

TANG, Shao-xian. "Intrusion detection based on unsupervised clustering and hybrid genetic algorithm". Journal of Computer Applications 28, n.º 2 (10 de julio de 2008): 409–11. http://dx.doi.org/10.3724/sp.j.1087.2008.00409.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Ghafir, Ibrahim, Konstantinos G. Kyriakopoulos, Francisco J. Aparicio-Navarro, Sangarapillai Lambotharan, Basil Assadhan y Hamad Binsalleeh. "A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection". IEEE Access 6 (2018): 40008–23. http://dx.doi.org/10.1109/access.2018.2855078.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Carrasco, Rafael San Miguel y Miguel-Angel Sicilia. "Unsupervised intrusion detection through skip-gram models of network behavior". Computers & Security 78 (septiembre de 2018): 187–97. http://dx.doi.org/10.1016/j.cose.2018.07.003.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Choi, Hyunseung, Mintae Kim, Gyubok Lee y Wooju Kim. "Unsupervised learning approach for network intrusion detection system using autoencoders". Journal of Supercomputing 75, n.º 9 (9 de marzo de 2019): 5597–621. http://dx.doi.org/10.1007/s11227-019-02805-w.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Siddiqui, Abdul Jabbar y Azzedine Boukerche. "Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection". Computing 103, n.º 6 (20 de febrero de 2021): 1209–32. http://dx.doi.org/10.1007/s00607-021-00912-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Zoppi, Tommaso, Andrea Ceccarelli, Tommaso Capecchi y Andrea Bondavalli. "Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape". ACM/IMS Transactions on Data Science 2, n.º 2 (2 de abril de 2021): 1–26. http://dx.doi.org/10.1145/3441140.

Texto completo
Resumen
Anomaly detection aims at identifying unexpected fluctuations in the expected behavior of a given system. It is acknowledged as a reliable answer to the identification of zero-day attacks to such extent, several ML algorithms that suit for binary classification have been proposed throughout years. However, the experimental comparison of a wide pool of unsupervised algorithms for anomaly-based intrusion detection against a comprehensive set of attacks datasets was not investigated yet. To fill such gap, we exercise 17 unsupervised anomaly detection algorithms on 11 attack datasets. Results allow elaborating on a wide range of arguments, from the behavior of the individual algorithm to the suitability of the datasets to anomaly detection. We conclude that algorithms as Isolation Forests, One-Class Support Vector Machines, and Self-Organizing Maps are more effective than their counterparts for intrusion detection, while clustering algorithms represent a good alternative due to their low computational complexity. Further, we detail how attacks with unstable, distributed, or non-repeatable behavior such as Fuzzing, Worms, and Botnets are more difficult to detect. Ultimately, we digress on capabilities of algorithms in detecting anomalies generated by a wide pool of unknown attacks, showing that achieved metric scores do not vary with respect to identifying single attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Qaddoura, Raneem, Ala’ M. Al-Zoubi, Iman Almomani y Hossam Faris. "A Multi-Stage Classification Approach for IoT Intrusion Detection Based on Clustering with Oversampling". Applied Sciences 11, n.º 7 (28 de marzo de 2021): 3022. http://dx.doi.org/10.3390/app11073022.

Texto completo
Resumen
Intrusion detection of IoT-based data is a hot topic and has received a lot of interests from researchers and practitioners since the security of IoT networks is crucial. Both supervised and unsupervised learning methods are used for intrusion detection of IoT networks. This paper proposes an approach of three stages considering a clustering with reduction stage, an oversampling stage, and a classification by a Single Hidden Layer Feed-Forward Neural Network (SLFN) stage. The novelty of the paper resides in the technique of data reduction and data oversampling for generating useful and balanced training data and the hybrid consideration of the unsupervised and supervised methods for detecting the intrusion activities. The experiments were evaluated in terms of accuracy, precision, recall, and G-mean and divided into four steps: measuring the effect of the data reduction with clustering, the evaluation of the framework with basic classifiers, the effect of the oversampling technique, and a comparison with basic classifiers. The results show that SLFN classification technique and the choice of Support Vector Machine and Synthetic Minority Oversampling Technique (SVM-SMOTE) with a ratio of 0.9 and the k value of 3 for k-means++ clustering technique give better results than other values and other classification techniques.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Vaiyapuri, Thavavel y Adel Binbusayyis. "Application of deep autoencoder as an one-class classifier for unsupervised network intrusion detection: a comparative evaluation". PeerJ Computer Science 6 (7 de diciembre de 2020): e327. http://dx.doi.org/10.7717/peerj-cs.327.

Texto completo
Resumen
The ever-increasing use of internet has opened a new avenue for cybercriminals, alarming the online businesses and organization to stay ahead of evolving thread landscape. To this end, intrusion detection system (IDS) is deemed as a promising defensive mechanism to ensure network security. Recently, deep learning has gained ground in the field of intrusion detection but majority of progress has been witnessed on supervised learning which requires adequate labeled data for training. In real practice, labeling the high volume of network traffic is laborious and error prone. Intuitively, unsupervised deep learning approaches has received gaining momentum. Specifically, the advances in deep learning has endowed autoencoder (AE) with greater ability for data reconstruction to learn the robust feature representation from massive amount of data. Notwithstanding, there is no study that evaluates the potential of different AE variants as one-class classifier for intrusion detection. This study fills this gap of knowledge presenting a comparative evaluation of different AE variants for one-class unsupervised intrusion detection. For this research, the evaluation includes five different variants of AE such as Stacked AE, Sparse AE, Denoising AE, Contractive AE and Convolutional AE. Further, the study intents to conduct a fair comparison establishing a unified network configuration and training scheme for all variants over the common benchmark datasets, NSL-KDD and UNSW-NB15. The comparative evaluation study provides a valuable insight on how different AE variants can be used as one-class classifier to build an effective unsupervised IDS. The outcome of this study will be of great interest to the network security community as it provides a promising path for building effective IDS based on deep learning approaches alleviating the need for adequate and diverse intrusion network traffic behavior.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Huang, Xiaolong. "Network Intrusion Detection Based on an Improved Long-Short-Term Memory Model in Combination with Multiple Spatiotemporal Structures". Wireless Communications and Mobile Computing 2021 (24 de abril de 2021): 1–10. http://dx.doi.org/10.1155/2021/6623554.

Texto completo
Resumen
Aimed at the existing problems in network intrusion detection, this paper proposes an improved LSTM combined with spatiotemporal structure for intrusion detection. The unsupervised spatiotemporal encoder is used to intelligently extract the spatial characteristics of network traffic data samples. It can not only retain the overall/nonlocal characteristics of the data samples but also extract the most essential deep features of the data samples. Finally, the extracted features are used as input of the LSTM model to realize classification and identification for intrusion samples. Experimental verification shows that the accuracy and false alarm rate of the intrusion detection model based on the neural network are significantly better than those of other traditional models.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Goernitz, N., M. Kloft, K. Rieck y U. Brefeld. "Toward Supervised Anomaly Detection". Journal of Artificial Intelligence Research 46 (20 de febrero de 2013): 235–62. http://dx.doi.org/10.1613/jair.3623.

Texto completo
Resumen
Anomaly detection is being regarded as an unsupervised learning task as anomalies stem from adversarial or unlikely events with unknown distributions. However, the predictive performance of purely unsupervised anomaly detection often fails to match the required detection rates in many tasks and there exists a need for labeled data to guide the model generation. Our first contribution shows that classical semi-supervised approaches, originating from a supervised classifier, are inappropriate and hardly detect new and unknown anomalies. We argue that semi-supervised anomaly detection needs to ground on the unsupervised learning paradigm and devise a novel algorithm that meets this requirement. Although being intrinsically non-convex, we further show that the optimization problem has a convex equivalent under relatively mild assumptions. Additionally, we propose an active learning strategy to automatically filter candidates for labeling. In an empirical study on network intrusion detection data, we observe that the proposed learning methodology requires much less labeled data than the state-of-the-art, while achieving higher detection accuracies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Barletta, Vita Santa, Danilo Caivano, Antonella Nannavecchia y Michele Scalera. "Intrusion Detection for in-Vehicle Communication Networks: An Unsupervised Kohonen SOM Approach". Future Internet 12, n.º 7 (14 de julio de 2020): 119. http://dx.doi.org/10.3390/fi12070119.

Texto completo
Resumen
The diffusion of embedded and portable communication devices on modern vehicles entails new security risks since in-vehicle communication protocols are still insecure and vulnerable to attacks. Increasing interest is being given to the implementation of automotive cybersecurity systems. In this work we propose an efficient and high-performing intrusion detection system based on an unsupervised Kohonen Self-Organizing Map (SOM) network, to identify attack messages sent on a Controller Area Network (CAN) bus. The SOM network found a wide range of applications in intrusion detection because of its features of high detection rate, short training time, and high versatility. We propose to extend the SOM network to intrusion detection on in-vehicle CAN buses. Many hybrid approaches were proposed to combine the SOM network with other clustering methods, such as the k-means algorithm, in order to improve the accuracy of the model. We introduced a novel distance-based procedure to integrate the SOM network with the K-means algorithm and compared it with the traditional procedure. The models were tested on a car hacking dataset concerning traffic data messages sent on a CAN bus, characterized by a large volume of traffic with a low number of features and highly imbalanced data distribution. The experimentation showed that the proposed method greatly improved detection accuracy over the traditional approach.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Sirisha, Aswadati, Kosaraju Chaitanya, Komanduri Venkata Sesha Sai Rama Krishna y Satya Sandeep Kanumalli. "Intrusion Detection Models Using Supervised and Unsupervised Algorithms - A Comparative Estimation". International Journal of Safety and Security Engineering 11, n.º 1 (28 de febrero de 2021): 51–58. http://dx.doi.org/10.18280/ijsse.110106.

Texto completo
Resumen
Intrusion Detection is a protection device that tracks and identifies inappropriate network behaviors. Several computer simulation methods for identifying network infiltrations have been suggested. The existing mechanisms are not adequate to cope with network protection threats that expand exponentially with Internet use. Unbalanced groups are one of the issues with datasets. This paper outlines the implementation and study on classification and identification of anomaly in different machine learning algorithms for network dependent intrusion. A number of balanced and unbalanced data sets are known as benchmarks for assessments by NSLKDD and CICIDS. For deciding the right range of options for app collection is the Random Forest Classifier. The chosen logistic regression, decision trees, random forest, naive bayes, nearest neighbors, K-means, isolation forest, locally-based outliers are a group of algorithms that have been monitored and unmonitored for their use. Results from implementations reveal that Random Forest beats the other approaches for supervised learning, though K-Means does better than others.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Dai, Yawen, Guanghui Yuan, Zhaoyuan Yang y Bin Wang. "K-Modes Clustering Algorithm Based on Weighted Overlap Distance and Its Application in Intrusion Detection". Scientific Programming 2021 (25 de mayo de 2021): 1–9. http://dx.doi.org/10.1155/2021/9972589.

Texto completo
Resumen
In order to better apply the K-modes algorithm to intrusion detection, this paper overcomes the problems of the existing K-modes algorithm based on rough set theory. Firstly, for the problem of K-modes clustering in the initial class center selection, an initial class center selection algorithm Ini_Weight based on weighted density and weighted overlap distance is proposed. Secondly, based on the Ini_Weight algorithm, a new K-modes clustering algorithm WODKM based on weighted overlap distance is proposed. Thirdly, the WODKM clustering algorithm is applied to intrusion detection to obtain a new unsupervised intrusion detection model. The model detects the intrusion by dividing the clusters in the clustering result into normal clusters and abnormal clusters and analyzing the weighted average density of the object x to be detected in each cluster and the weighted overlapping distance of x and each center point. We verified the intrusion detection performance of the model on the KDD Cup 99 dataset. The experimental results of the current study show that the proposed intrusion detection model achieves efficient results and solves the problems existing in the present-day intrusion detection system to some extent.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Prasanta Gogoi, B. Borah y D. K. Bhattacharyya. "Anomaly Detection Analysis of Intrusion Data Ising Supervised & Unsupervised Approach". Journal of Convergence Information Technology 5, n.º 1 (28 de febrero de 2010): 95–110. http://dx.doi.org/10.4156/jcit.vol5.issue1.11.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Ramani Varanasi, Venkata. "A Comparative Evaluation of supervised and unsupervised algorithms for Intrusion Detection". International Journal of Advanced Trends in Computer Science and Engineering 9, n.º 4 (25 de agosto de 2020): 4834–43. http://dx.doi.org/10.30534/ijatcse/2020/9394202.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Wang, Xiao Bin, Yong Jun Wang y Yong Lin Sun. "Abnormal File Access Behavior Detection Based on FPD: An Unsupervised Approach". Applied Mechanics and Materials 713-715 (enero de 2015): 2212–16. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2212.

Texto completo
Resumen
Information security is a great challenge for organizations in our modern information world. Existing security facilities like Firewalls, Intrusion Detection Systems and Antivirus are not enough to guarantee the security of information. File is an important carrier of information, which is the intent of quite a number of attackers. In this paper, we extend the FPD-based approach for detecting abnormal file access behaviors. We propose 3 approaches to calculate FPD values in the case of lacking training data, and we apply a k-means based unsupervised approach to distinguish between normal processes and abnormal ones. Experiment demonstrate that our unsupervised approach is still effective compared to the supervised case with training data.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Daneshpazhouh, Armin y Ashkan Sami. "Semi-Supervised Outlier Detection with Only Positive and Unlabeled Data Based on Fuzzy Clustering". International Journal on Artificial Intelligence Tools 24, n.º 03 (junio de 2015): 1550003. http://dx.doi.org/10.1142/s0218213015500037.

Texto completo
Resumen
The task of semi-supervised outlier detection is to find the instances that are exceptional from other data, using some labeled examples. In many applications such as fraud detection and intrusion detection, this issue becomes more important. Most existing techniques are unsupervised. On the other hand, semi-supervised approaches use both negative and positive instances to detect outliers. However, in many real world applications, very few positive labeled examples are available. This paper proposes an innovative approach to address this problem. The proposed method works as follows. First, some reliable negative instances are extracted by a kNN-based algorithm. Afterwards, fuzzy clustering using both negative and positive examples is utilized to detect outliers. Experimental results on real data sets demonstrate that the proposed approach outperforms the previous unsupervised state-of-the-art methods in detecting outliers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Sahu, Santosh Kumar, Akanksha Katiyar, Kanchan Mala Kumari, Govind Kumar y Durga Prasad Mohapatra. "An SVM-Based Ensemble Approach for Intrusion Detection". International Journal of Information Technology and Web Engineering 14, n.º 1 (enero de 2019): 66–84. http://dx.doi.org/10.4018/ijitwe.2019010104.

Texto completo
Resumen
The objective of this article is to develop an intrusion detection model aimed at distinguishing attacks in the network. The aim of building IDS relies on upon preprocessing of intrusion data, choosing most relevant features and in the plan of an efficient learning algorithm that properly groups the normal and malicious examples. In this experiment, the detection model uses an ensemble approach of supervised (SVM) and unsupervised (K-Means) to detect the patterns. This technique first divides the data and forms two clusters as per K-Means and labels the clusters using the Support Vector Machine (SVM). The parameters of K-Means and SVM are tuned and optimized using an intrusion dataset. The SVM provides up to 88%, and K-Means provides up to 83% accuracy individually. However, the ensemble of K-Means and SVM provides more than 99% on three benchmarked datasets in less time. The SVM only classifies three instances of each cluster randomly and labels them as per a majority voting approach. The proposed approach outperforms compared to earlier ensemble approaches on intrusion datasets.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Javidi, Mohammad Masoud. "Network Attacks Detection by Hierarchical Neural Network". Computer Engineering and Applications Journal 4, n.º 2 (18 de junio de 2015): 119–32. http://dx.doi.org/10.18495/comengapp.v4i2.108.

Texto completo
Resumen
Intrusion detection is an emerging area of research in the computer security and net-works with the growing usage of internet in everyday life. Most intrusion detection systems (IDSs) mostly use a single classifier algorithm to classify the network traffic data as normal behavior or anomalous. However, these single classifier systems fail to provide the best possible attack detection rate with low false alarm rate. In this paper,we propose to use a hybrid intelligent approach using a combination of classifiers in order to make the decision intelligently, so that the overall performance of the resul-tant model is enhanced. The general procedure in this is to follow the supervised or un-supervised data filtering with classifier or cluster first on the whole training dataset and then the output are applied to another classifier to classify the data. In this re- search, we applied Neural Network with Supervised and Unsupervised Learning in order to implement the intrusion detection system. Moreover, in this project, we used the method of Parallelization with real time application of the system processors to detect the systems intrusions.Using this method enhanced the speed of the intrusion detection. In order to train and test the neural network, NSLKDD database was used. Creating some different intrusion detection systems, each of which considered as a single agent, we precisely proceeded with the signature-based intrusion detection of the network.In the proposed design, the attacks have been classified into 4 groups and each group is detected by an Agent equipped with intrusion detection system (IDS).These agents act independently and report the intrusion or non-intrusion in the system; the results achieved by the agents will be studied in the Final Analyst and at last the analyst reports that whether there has been an intrusion in the system or not.Keywords: Intrusion Detection, Multi-layer Perceptron, False Positives, Signature- based intrusion detection, Decision tree, Nave Bayes Classifier
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Wang, Zu-Min, Ji-Yu Tian, Jing Qin, Hui Fang y Li-Ming Chen. "A Few-Shot Learning-Based Siamese Capsule Network for Intrusion Detection with Imbalanced Training Data". Computational Intelligence and Neuroscience 2021 (13 de septiembre de 2021): 1–17. http://dx.doi.org/10.1155/2021/7126913.

Texto completo
Resumen
Network intrusion detection remains one of the major challenges in cybersecurity. In recent years, many machine-learning-based methods have been designed to capture the dynamic and complex intrusion patterns to improve the performance of intrusion detection systems. However, two issues, including imbalanced training data and new unknown attacks, still hinder the development of a reliable network intrusion detection system. In this paper, we propose a novel few-shot learning-based Siamese capsule network to tackle the scarcity of abnormal network traffic training data and enhance the detection of unknown attacks. In specific, the well-designed deep learning network excels at capturing dynamic relationships across traffic features. In addition, an unsupervised subtype sampling scheme is seamlessly integrated with the Siamese network to improve the detection of network intrusion attacks under the circumstance of imbalanced training data. Experimental results have demonstrated that the metric learning framework is more suitable to extract subtle and distinctive features to identify both known and unknown attacks after the sampling scheme compared to other supervised learning methods. Compared to the state-of-the-art methods, our proposed method achieves superior performance to effectively detect both types of attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Vega Vega, Rafael Alejandro, Pablo Chamoso-Santos, Alfonso González Briones, José-Luis Casteleiro-Roca, Esteban Jove, María del Carmen Meizoso-López, Benigno Antonio Rodríguez-Gómez et al. "Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids". Applied Sciences 10, n.º 7 (27 de marzo de 2020): 2276. http://dx.doi.org/10.3390/app10072276.

Texto completo
Resumen
The present research work focuses on overcoming cybersecurity problems in the Smart Grid. Smart Grids must have feasible data capture and communications infrastructure to be able to manage the huge amounts of data coming from sensors. To ensure the proper operation of next-generation electricity grids, the captured data must be reliable and protected against vulnerabilities and possible attacks. The contribution of this paper to the state of the art lies in the identification of cyberattacks that produce anomalous behaviour in network management protocols. A novel neural projectionist technique (Beta Hebbian Learning, BHL) has been employed to get a general visual representation of the traffic of a network, making it possible to identify any abnormal behaviours and patterns, indicative of a cyberattack. This novel approach has been validated on 3 different datasets, demonstrating the ability of BHL to detect different types of attacks, more effectively than other state-of-the-art methods.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Hanselmann, Markus, Thilo Strauss, Katharina Dormann y Holger Ulmer. "CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data". IEEE Access 8 (2020): 58194–205. http://dx.doi.org/10.1109/access.2020.2982544.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Nisioti, Antonia, Alexios Mylonas, Paul D. Yoo y Vasilios Katos. "From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods". IEEE Communications Surveys & Tutorials 20, n.º 4 (2018): 3369–88. http://dx.doi.org/10.1109/comst.2018.2854724.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Kumar Mallick, Pradeep, Bibhu Prasad Mohanty, Sudan Jha y Kuhoo . "A novel Approach Using “Supervised and Unsupervised learning” to prevent the Adequacy of Intrusion Detection Systems". International Journal of Engineering & Technology 7, n.º 3.34 (1 de septiembre de 2018): 474. http://dx.doi.org/10.14419/ijet.v7i3.34.19362.

Texto completo
Resumen
Countering digital dangers, particularly assault detection, is a testing region of research in the field of data affirmation. Intruders utilize polymorphic instruments to disguise the assault payload and dodge the detection methods. Many supervised and unsupervised learning comes closer from the field of machine learning and example acknowledgments have been utilized to expand the adequacy of intrusion detection systems (IDSs). Supervised learning approaches utilize just marked examples to prepare a classifier, however getting adequate named tests is lumbering, and requires the endeavors of area specialists. Notwithstanding, un-marked examples can without much of a stretch be acquired in some genuine issues. Contrasted with super-vised learning approaches, semi-supervised learning (SSL) addresses this issue by considering expansive number of unlabeled examples together with the marked examples to fabricate a superior classifier. In today’s age security is a big issue and every day when we are on the internet we are exposed to a huge number of threats where our personal information can be leaked. The information security and the Intrusion Detection System (IDS) play a critical role in the internet. IDS isan essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality, and system availability against possible threats. In this paper, we are proposing a modified Elitist approach where the value of fitness is multiplied by the times a variable which is determined on the basis of the value of Kappa (K).
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Yu, Zhenhao, Fang Liu, Yinquan Yuan, Sihan Li y Zhengying Li. "Signal Processing for Time Domain Wavelengths of Ultra-Weak FBGs Array in Perimeter Security Monitoring Based on Spark Streaming". Sensors 18, n.º 9 (4 de septiembre de 2018): 2937. http://dx.doi.org/10.3390/s18092937.

Texto completo
Resumen
To detect perimeter intrusion accurately and quickly, a stream computing technology was used to improve real-time data processing in perimeter intrusion detection systems. Based on the traditional density-based spatial clustering of applications with noise (T-DBSCAN) algorithm, which depends on manual adjustments of neighborhood parameters, an adaptive parameters DBSCAN (AP-DBSCAN) method that can achieve unsupervised calculations was proposed. The proposed AP-DBSCAN method was implemented on a Spark Streaming platform to deal with the problems of data stream collection and real-time analysis, as well as judging and identifying the different types of intrusion. A number of sensing and processing experiments were finished and the experimental data indicated that the proposed AP-DBSCAN method on the Spark Streaming platform exhibited a fine calibration capacity for the adaptive parameters and the same accuracy as the T-DBSCAN method without the artificial setting of neighborhood parameters, in addition to achieving good performances in the perimeter intrusion detection systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Om Pal, Peeyush Jain, Sudhansu Goyal, Zia Saquib y Bernard L. Menezes. "Intrusion Detection Using Graph Support: A Hybrid Approach of Supervised and Unsupervised Techniques". International Journal of Advancements in Computing Technology 2, n.º 3 (31 de agosto de 2010): 114–18. http://dx.doi.org/10.4156/ijact.vol2.issue3.12.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Rabbani, Mahdi, Yongli Wang, Reza Khoshkangini, Hamed Jelodar, Ruxin Zhao, Sajjad Bagheri Baba Ahmadi y Seyedvalyallah Ayobi. "A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies". Entropy 23, n.º 5 (25 de abril de 2021): 529. http://dx.doi.org/10.3390/e23050529.

Texto completo
Resumen
Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Jing, Yong Wen y Li Fen Li. "SOM and PSO Based Alerts Clustering in Intrusion Detection System". Applied Mechanics and Materials 401-403 (septiembre de 2013): 1453–57. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1453.

Texto completo
Resumen
With the growing deployment of host and network intrusion detection systems (IDSs), thousands of alerts are generally generated from them per day. Managing these alerts becomes critically important. In this paper, a hybrid alert clustering method based on self-Organizing maps (SOM) and particle swarm optimization (PSO) is presented. We firstly select the important features through binary particle swarm optimization (BPSO) and mutual information (MI) and get a dimension reduced dataset. SOM is used to cluster the dataset. PSO is used to evolve the weights for SOM to improve the clustering result. The algorithm is based on a type of unsupervised machine learning algorithm that infers relationships from data without the need to train the algorithm with expertly labelled data. The approach is validated using the 2000 DARPA intrusion detection datasets and comparative results between the canonical SOM and our scheme are presented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Jabbar, Ayad. "Local and Global Outlier Detection Algorithms in Unsupervised Approach: A Review". Iraqi Journal for Electrical and Electronic Engineering 17, n.º 1 (31 de marzo de 2021): 1–12. http://dx.doi.org/10.37917/ijeee.17.1.9.

Texto completo
Resumen
The problem of outlier detection is one of the most important issues in the field of analysis due to its applicability in several famous problem domains, including intrusion detection, security, banks, fraud detection, and discovery of criminal activities in electronic commerce. Anomaly detection comprises two main approaches: supervised and unsupervised approach. The supervised approach requires pre-defined information, which is defined as the type of outliers, and is difficult to be defined in some applications. Meanwhile, the second approach determines the outliers without human interaction. A review of the unsupervised approach, which shows the main advantages and the limitations considering the studies performed in the supervised approach, is introduced in this paper. This study indicated that the unsupervised approach suffers from determining local and global outlier objects simultaneously as the main problem related to algorithm parameterization. Moreover, most algorithms do not rank or identify the degree of being an outlier or normal objects and required different parameter settings by the research. Examples of such parameters are the radius of neighborhood, number of neighbors within the radius, and number of clusters. A comprehensive and structured overview of a large set of interesting outlier algorithms, which emphasized the outlier detection limitation in the unsupervised approach, can be used as a guideline for researchers who are interested in this field.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Almomani, Ammar, Mohammad Alauthman, Firas Albalas, O. Dorgham y Atef Obeidat. "An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms". International Journal of Cloud Applications and Computing 8, n.º 2 (abril de 2018): 96–112. http://dx.doi.org/10.4018/ijcac.2018040105.

Texto completo
Resumen
This article describes how as network traffic grows, attacks on traffic become more complicated and harder to detect. Recently, researchers have begun to explore machine learning techniques with cloud computing technologies to classify network threats. So, new and creative ways are needed to enhance intrusion detection system. This article addresses the source of the above issues through detecting an intrusion in cloud computing before it further disrupts normal network operations, because the complexity of malicious attack techniques have evolved from traditional malicious attack technologies (direct malicious attack), which include different malicious attack classes, such as DoS, Probe, R2L, and U2R malicious attacks, especially the zero-day attack in online mode. The proposed online intrusion detection cloud system (OIDCS) adopts the principles of the new spiking neural network architecture called NeuCube algorithm. It is proposed that this system is the first filtering system approach that utilizes the NeuCube algorithm. The OIDCS inherits the hybrid (supervised/unsupervised) learning feature of the NeuCube algorithm and uses this algorithm in an online system with lifelong learning to classify input while learning the system. The system is accurate, especially when working with a zero-day attack, reaching approximately 97% accuracy based on the to-be-remembered (TBR) encoding algorithm.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Ramaiah, CH, D. Adithya Charan y R. Syam Akhil. "Secure automated threat detection and prevention (SATDP)". International Journal of Engineering & Technology 7, n.º 2.20 (18 de abril de 2018): 86. http://dx.doi.org/10.14419/ijet.v7i2.20.11760.

Texto completo
Resumen
Secure automated threat detection and prevention is the more effective procedure to reduce the workload of analyst by scanning the network, server functions& then informs the analyst if any suspicious activity is detected in the network. It monitors the system continuously and responds according to the threat environment. This response action varies from phase to phase. Here suspicious activities are detected by the help of an artificial intelligence which acts as a virtual analyst concurrently with network intrusion detection system to defend from the threat environment and taking appropriate measures with the permission of the analyst. In its final phase where packet analysis is carried out to surf for attack vectors and then categorize supervised and unsupervised data. Where the unsupervised data will be decoded or converted to supervised data with help of analyst feedback and then auto-update the algorithm (virtual analyst). So that it evolves the algorithm (with active learning mechanism) itself by time and become more efficient, strong. So, it can able to defend form similar or same kind of attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Mohammadpour, Leila, T. C. Ling, C. S. Liew y Alihossein Aryanfar. "A Mean Convolutional Layer for Intrusion Detection System". Security and Communication Networks 2020 (24 de octubre de 2020): 1–16. http://dx.doi.org/10.1155/2020/8891185.

Texto completo
Resumen
The significant development of Internet applications over the past 10 years has resulted in the rising necessity for the information network to be secured. An intrusion detection system is a fundamental network infrastructure defense that must be able to adapt to the ever-evolving threat landscape and identify new attacks that have low false alarm. Researchers have developed several supervised as well as unsupervised methods from the data mining and machine learning disciplines so that anomalies can be detected reliably. As an aspect of machine learning, deep learning uses a neuron-like structure to learn tasks. A successful deep learning technique method is convolution neural network (CNN); however, it is presently not suitable to detect anomalies. It is easier to identify expected contents within the input flow in CNNs, whereas there are minor differences in the abnormalities compared to the normal content. This suggests that a particular method is required for identifying such minor changes. It is expected that CNNs would learn the features that form the characteristic of the content of an image (flow) rather than variations that are unrelated to the content. Hence, this study recommends a new CNN architecture type known as mean convolution layer (CNN-MCL) that was developed for learning the anomalies’ content features and then identifying the particular abnormality. The recommended CNN-MCL helps in designing a strong network intrusion detection system that includes an innovative form of convolutional layer that can teach low-level abnormal characteristics. It was observed that assessing the proposed model on the CICIDS2017 dataset led to favorable results in terms of real-world application regarding detecting anomalies that are highly accurate and have low false-alarm rate as opposed to other best models.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Dr.R.Venkatesh, Kavitha S, Dr Uma Maheswari N,. "Network Anomaly Detection for NSL-KDD Dataset Using Deep Learning". INFORMATION TECHNOLOGY IN INDUSTRY 9, n.º 2 (31 de marzo de 2021): 821–27. http://dx.doi.org/10.17762/itii.v9i2.419.

Texto completo
Resumen
Deep learning based intrusion detection cyber security methods gained increased popularity. The essential element to provide protection to the ICT infrastructure is the intrusion detection systems (IDSs). Intelligent solutions are necessary to control the complexity and increase in the new attack types. The intelligent system (DL/ML) has been widely used with its benefits to effectively deal with complex and great dimensional data. The IDS has various attack types like known, unknown, zero day attacks are attractive to and detected using unsupervised machine learning techniques. A novel methodology has been proposed that combines the benefits of Isolation forest (One Class) Support Vector Machine (OCSVM) with active learning method to detect threats without any prior knowledge. The NSL-KDD dataset has been used to evaluate the various DL methods with active learning method. The results show that this method performs better than other techniques. The design methodology inspires the efforts to emerging anomaly detection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Lee, JooHwa y KeeHyun Park. "AE-CGAN Model based High Performance Network Intrusion Detection System". Applied Sciences 9, n.º 20 (10 de octubre de 2019): 4221. http://dx.doi.org/10.3390/app9204221.

Texto completo
Resumen
In this paper, a high-performance network intrusion detection system based on deep learning is proposed for situations in which there are significant imbalances between normal and abnormal traffic. Based on the unsupervised learning models autoencoder (AE) and the generative adversarial networks (GAN) model during deep learning, the study aim is to solve the imbalance of data and intrusion detection of high performance. The AE-CGAN (autoencoder-conditional GAN) model is proposed to improve the performance of intrusion detection. This model oversamples rare classes based on the GAN model in order to solve the performance degradation caused by data imbalance after processing the characteristics of the data to a lower level using the autoencoder model. To measure the performance of the AE-CGAN model, data is classified using random forest (RF), a typical machine learning classification algorithm. In this experiment, we used the canadian institute for cybersecurity intrusion detection system (CICIDS)2017 dataset, the latest public dataset of network intrusion detection system (NIDS), and compared the three models to confirm efficacy of the proposed model. We compared the performance of three types of models. These included single-RF, a classification model using only a classification algorithm, AE-RF which is processed by classifying data features, and the AE-CGAN model which is classified after solving the data feature processing and data imbalance. Experimental results showed that the performance of the AE-CGAN model proposed in this paper was the highest. In particular, when the data were unbalanced, the performances of recall and F1 score, which are more accurate performance indicators, were 93.29% and 95.38%, respectively. The AE-CGAN model showed much better performance.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Kuwahara, Takuya, Yukino Baba, Hisashi Kashima, Takeshi Kishikawa, Junichi Tsurumi, Tomoyuki Haga, Yoshihiro Ujiie, Takamitsu Sasaki y Hideki Matsushima. "Supervised and Unsupervised Intrusion Detection Based on CAN Message Frequencies for In-vehicle Network". Journal of Information Processing 26 (2018): 306–13. http://dx.doi.org/10.2197/ipsjjip.26.306.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Qu, Hongchun, Zeliang Qiu, Xiaoming Tang, Min Xiang y Ping Wang. "Incorporating unsupervised learning into intrusion detection for wireless sensor networks with structural co-evolvability". Applied Soft Computing 71 (octubre de 2018): 939–51. http://dx.doi.org/10.1016/j.asoc.2018.07.044.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Prasad, Mahendra, Sachin Tripathi y Keshav Dahal. "Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection". Computers & Security 99 (diciembre de 2020): 102062. http://dx.doi.org/10.1016/j.cose.2020.102062.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Sovilj, Dušan, Paul Budnarain, Scott Sanner, Geoff Salmon y Mohan Rao. "A comparative evaluation of unsupervised deep architectures for intrusion detection in sequential data streams". Expert Systems with Applications 159 (noviembre de 2020): 113577. http://dx.doi.org/10.1016/j.eswa.2020.113577.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía