A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
Network intrusion detection research work that employed KDDCup 99 dataset often encounter challenges in creating classifiers that could handle unequal distributed attack categories. The accuracy of a classification model could be jeopardized if the distribution of attack categories in a training dat...
| Main Authors: | Khor, Kok Chin, Ting, Choo Yee, Somnuk, Phon Amnuaisuk |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer US
2012
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3463/ http://shdl.mmu.edu.my/3463/1/A%20cascaded%20classifier%20approach%20for%20improving%20detection%20rates%20on%C2%A0rare%20attack%20categories%20in%20network%20intrusion%20detection.pdf |
Similar Items
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Properties of Bayesian student model for INQPRO
by: Ting, Choo-Yee, et al.
Published: (2012)
by: Ting, Choo-Yee, et al.
Published: (2012)
Car detection using cascade classifier on embedded platform
by: Zulkhairi, Muhammad Asyraf, et al.
Published: (2020)
by: Zulkhairi, Muhammad Asyraf, et al.
Published: (2020)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
Affective music processing: Challenges
by: Phon-Amnuaisuk, Somnuk
Published: (2005)
by: Phon-Amnuaisuk, Somnuk
Published: (2005)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
A Bayesian approach to classify conference papers
by: Khor, , Kok-Chin, et al.
Published: (2006)
by: Khor, , Kok-Chin, et al.
Published: (2006)
Establishing a Probabilistic Model for Cognitive Learning Style
by: Teh, Yoke-Jin, et al.
Published: (2005)
by: Teh, Yoke-Jin, et al.
Published: (2005)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Modeling and intervening across time in scientific inquiry exploratory learning environment
by: Ting, Choo Yee, et al.
Published: (2008)
by: Ting, Choo Yee, et al.
Published: (2008)
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
by: Al-Zarqawee, Aws Naser
Published: (2018)
by: Al-Zarqawee, Aws Naser
Published: (2018)
Fatigue detection system with haar cascade classifier
by: Nor Sany, Nor Saiful Amierrul, et al.
Published: (2021)
by: Nor Sany, Nor Saiful Amierrul, et al.
Published: (2021)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Implementation of haar cascade classifier and eye aspect ratio for driver drowsiness detection using raspberry pi
by: Kamarudin, Nora, et al.
Published: (2019)
by: Kamarudin, Nora, et al.
Published: (2019)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
A comparative study of different fuzzy classifiers for cloud intrusion detection systems' alerts
by: Alqahtani, Saeed M., et al.
Published: (2016)
by: Alqahtani, Saeed M., et al.
Published: (2016)
Determining a Suitable Desired Factors for Nonnegative Matrix Factorization in Polyphonic Music Transcription
by: Sophea, Seng, et al.
Published: (2007)
by: Sophea, Seng, et al.
Published: (2007)
Effects of Time and Frequency Resolution on Nonnegative Matrix Factorization
by: Sophea, Seng, et al.
Published: (2007)
by: Sophea, Seng, et al.
Published: (2007)
Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns
by: Chan, Gaik Yee, et al.
Published: (2016)
by: Chan, Gaik Yee, et al.
Published: (2016)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Chorale harmonization: A view from a search control perspective
by: Phon-Amnuaisuk, Somnuk, et al.
Published: (2006)
by: Phon-Amnuaisuk, Somnuk, et al.
Published: (2006)
Racing car detection using cascaded classifier / Ho Seck Wei
by: Ho, Seck Wei
Published: (2017)
by: Ho, Seck Wei
Published: (2017)
Hot-based intrusion detection system (HIDS)
by: Zaid Affendi, Zainol
Published: (2005)
by: Zaid Affendi, Zainol
Published: (2005)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Towards music fitness evaluation with the hierarchical SOM
by: Edwin Hui Hean, Law, et al.
Published: (2008)
by: Edwin Hui Hean, Law, et al.
Published: (2008)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS)
by: Leow, Yu Hong
Published: (2024)
by: Leow, Yu Hong
Published: (2024)
Similar Items
-
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009) -
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002) -
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015) -
Properties of Bayesian student model for INQPRO
by: Ting, Choo-Yee, et al.
Published: (2012) -
Car detection using cascade classifier on embedded platform
by: Zulkhairi, Muhammad Asyraf, et al.
Published: (2020)